Daniel's Tech Blog

Cloud Computing, Cloud Native & Kubernetes

Link summary for guidance for mitigation and protection from Spectre and Meltdown on Windows Server, Hyper-V and Azure

From a security perspective the new year has started with a big bang. If you have lost the traction where you get the necessary information for guidance for mitigation and protection from Spectre and Meltdown on Windows Server, Hyper-V, and Azure, then have a look at the following link summary.

Windows Server in general:

Windows Server guidance to protect against speculative execution side-channel vulnerabilities
-> https://support.microsoft.com/en-us/help/4072698/windows-server-guidance-to-protect-against-the-speculative-execution

Understanding the performance impact of Spectre and Meltdown mitigations on Windows Systems
-> https://cloudblogs.microsoft.com/microsoftsecure/2018/01/09/understanding-the-performance-impact-of-spectre-and-meltdown-mitigations-on-windows-systems/

Hyper-V and Hyper-V guest VMs:

Alternative protections for Windows Server 2016 Hyper-V Hosts against the speculative execution side-channel vulnerabilities
-> https://docs.microsoft.com/en-us/virtualization/hyper-v-on-windows/CVE-2017-5715-and-hyper-v-hosts

Protecting guest virtual machines from CVE-2017-5715 (branch target injection)
-> https://docs.microsoft.com/en-us/virtualization/hyper-v-on-windows/CVE-2017-5715-and-hyper-v-vms

Microsoft Azure:

Guidance for mitigating speculative execution side-channel vulnerabilities in Azure
-> https://docs.microsoft.com/en-us/azure/virtual-machines/windows/mitigate-se

Securing Azure customers from CPU vulnerability
-> https://azure.microsoft.com/en-us/blog/securing-azure-customers-from-cpu-vulnerability/

WordPress Cookie Notice by Real Cookie Banner