Cloud Audit Controls

This blog is about understanding, auditing, and addressing risk in cloud environments. Systems and architectures are rapidly converging, hiding complexity with additional layers of abstraction. Simplicity is great for operations - as long as risks are understood and addressed.

Pages

  • Home
  • Downloads
  • Solutions Checklist
  • CAC Model 2.0
  • CAC Model 1.0
  • Links
  • About

Thursday, September 1, 2011

Yellow Bricks vSphere 5 Links

Posted to a mailing list courtesy of Ben Crook. Information is linked to http://www.yellow-bricks.com.
  1. Live Blog: Raising The Bar, Part V
  2. 5 is the magic number
  3. Hot of the press: vSphere 5.0 Clustering Technical Deepdive
  4. vSphere 5.0: Storage DRS introduction
  5. vSphere 5.0: What has changed for VMFS?
  6. vSphere 5.0: Storage vMotion and the Mirror Driver
  7. Punch Zeros
  8. Storage DRS interoperability
  9. vSphere 5.0: UNMAP (vaai feature)
  10. vSphere 5.0: ESXCLI
  11. ESXi 5: Suppressing the local/remote shell warning
  12. Testing VM Monitoring with vSphere 5.0
  13. What’s new?
  14. vSphere 5:0 vMotion Enhancements
  15. vSphere 5.0: vMotion enhancement, tiny but very welcome!
  16. ESXi 5.0 and Scripted Installs
  17. vSphere 5.0: Storage initiatives
  18. Scale Up/Out and impact of vRAM?!? (part 2)
  19. HA Architecture Series – FDM (1/5)
  20. HA Architecture Series – Primary nodes? (2/5)
  21. HA Architecture Series – Datastore Heartbeating (3/5)
  22. HA Architecture Series – Restarting VMs (4/5)
  23. HA Architecture Series – Advanced Settings (5/5)
  24. VMFS-5 LUN Sizing
  25. vSphere 5.0 HA: Changes in admission control
  26. vSphere 5 – Metro vMotion
  27. SDRS and Auto-Tiering solutions – The Injector
Posted by CD at 11:01 AM
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Newer Post Older Post Home

About the Author

About the Author

This is my personal blog.

Hi! All posts are my own and represent my own opinion. I work for VMware in the Office of the CTO. However, these are my personal views and do not necessarily represent the views of my employer.

I've been fortunate to learn from amazing people. This blog is my personal sticky pad. You can learn more about me on LinkedIn. Pay it forward!

Contact: davischr2 [at] gmail

All materials on this website and the documents repository are provided for personal use only. Commercial use, distribution, derivative works, product integration, sales, and licensing are prohibited.

Vulnerability Search

Search for Vulnerabilities
Enter vendor, software, or keyword

Popular Posts

  • PCI DSS v3.2 Spreadsheet Format
    PCI DSS v3.2 Spreadsheet loaded here:  https://www.compliancequickstart.com/ Most are wondering about 3.2.1. The mapping is the same. Co...
  • Spreadsheet: ISO PCI HIPAA 800-53 FedRAMP CSA SANS SCSEM CESG
    Get the 'Common Authorities on Information Assurance' spreadsheet here.  (xlsx) [2016-02-03 Update] -- PCIv3.1 controls spread...
  • NIST Cyber Security Framework (CSF) Excel Spreadsheet
    NIST Cybersecurity Framework Excel Spreadsheet Go to the documents tab and look under authorities folder. Contains properly split-out t...
  • SP 800-53A Revision 4 controls, objectives, CNSS 1253 Excel Spreadsheet
    Here's a cleaned up and combined Excel spreadsheet version of Special Publication 800-53A r4 containing controls, objectives, and CNS...
  • MAC vs DAC vs RBAC
    Recently had a discussion regarding mandatory access controls, discretionary access controls, and role-based access controls. The goal of...
  • 2016 Controls Map - Indexed to NIST - Free Gift
    Delivered to you with pleasure and as a courtesy of one of the best managers I have had. Jerry Breaud trusted me to run with my gut instinct...
  • Cloud Security Alliance: Consensus Assessment Initiative Questionnaire
    Last year I reviewed the Cloud Security Alliance Consensus Assessment Initiative Questionnaire ( CSA-CAIQ ). I've posted the enhanced v...
  • NIST SP 800-53 r4 to CJIS v5.4 Control Mapping
    Reverse mapped CJIS control set into NIST 800-53 controls as the new baseline. Download here .
  • Why you need to read the Summary of NIST SP 800-53 Revision 4
    This is the most concise list of answers I've seen to the most commonly asked questions and misconceptions my customers, peers, and s...

Blog Archive

  • ►  2021 (3)
    • ►  March (1)
    • ►  February (2)
  • ►  2020 (10)
    • ►  August (1)
    • ►  July (1)
    • ►  June (2)
    • ►  April (1)
    • ►  March (1)
    • ►  February (2)
    • ►  January (2)
  • ►  2019 (14)
    • ►  October (1)
    • ►  August (3)
    • ►  May (4)
    • ►  April (1)
    • ►  March (2)
    • ►  February (3)
  • ►  2018 (1)
    • ►  March (1)
  • ►  2017 (1)
    • ►  February (1)
  • ►  2016 (17)
    • ►  October (2)
    • ►  May (1)
    • ►  April (2)
    • ►  March (1)
    • ►  February (6)
    • ►  January (5)
  • ►  2015 (13)
    • ►  December (4)
    • ►  November (3)
    • ►  October (1)
    • ►  August (1)
    • ►  May (1)
    • ►  March (1)
    • ►  February (1)
    • ►  January (1)
  • ►  2014 (11)
    • ►  December (1)
    • ►  October (1)
    • ►  September (4)
    • ►  July (1)
    • ►  April (1)
    • ►  March (2)
    • ►  February (1)
  • ►  2013 (15)
    • ►  December (1)
    • ►  September (1)
    • ►  July (1)
    • ►  June (2)
    • ►  April (6)
    • ►  March (3)
    • ►  February (1)
  • ►  2012 (23)
    • ►  November (2)
    • ►  September (1)
    • ►  August (2)
    • ►  June (1)
    • ►  May (2)
    • ►  April (3)
    • ►  March (5)
    • ►  February (3)
    • ►  January (4)
  • ▼  2011 (23)
    • ►  December (8)
    • ►  November (4)
    • ►  October (3)
    • ▼  September (3)
      • Security Rebooted.
      • Sites for Malware Analysis
      • Yellow Bricks vSphere 5 Links
    • ►  August (5)

Subscribe...

Posts
Atom
Posts
Comments
Atom
Comments
Awesome Inc. theme. Powered by Blogger.