Issue link: https://insights.oneneck.com/i/1450344
CHAPTER 6 Securing Next-Generation Hyperconverged Infrastructure 53 These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. involved in policy management. The responsibility for under- standing the infrastructure or network connectivity is removed from the human policy writers and left to the virtualization plat- form, which always knows the information needed to automati- cally update the policy accordingly. Ideally, policy writers should incorporate application-level secu- rity policy without any changes to the existing network configu- ration, keeping things simple and allowing admins and architects to focus on the business or application requirements, not the network infrastructure. Eliminating the reliance or impact on the existing physical network also eliminates the need to change or rearchitect the physical design. As a result, the time required to implement security policy is dramatically reduced.