Given the proliferation of available hardware and software products that enable capitalizing on benefits associated with IT virtualization, when IT employees fail to perform effective configuration management; potential threats to the IT architecture are significantly increased. Besides managing the common risks associated with utilizing virtual memory and system virtual machines, additional procedures are necessary due to the inherent control weakness in program conversion to binary code for deployed process virtual machines. In particular, since process virtual machines are typically implemented using a program interpreter that relies on just-in-time source code compilation, programs are more susceptible to task modification. Thus, IT virtualization technology must be controlled to prevent service disruptions to end users and financial losses to the entity.
“View Part I of the Managing the Growth and Impact of Virtual Machines and Memory series here“