This curriculum spans the full operational lifecycle of virtual assets across discovery, classification, compliance, cost management, and optimization, equivalent in scope to a multi-phase internal capability program aligning ITAM, cloud operations, security, and financial governance teams on standardized controls for dynamic environments.
Module 1: Defining and Classifying Virtual Assets in Enterprise Environments
- Determine whether a virtual machine template qualifies as a managed asset based on organizational change control policies and lifecycle tracking requirements.
- Classify virtual assets (VMs, containers, serverless functions) according to ownership, purpose, and compliance sensitivity to align with existing ITAM taxonomies.
- Establish naming conventions for virtual instances that support automated discovery and prevent duplication in multi-cloud environments.
- Decide whether ephemeral workloads (e.g., CI/CD build agents) require full asset registration or exception-based tracking.
- Map virtual asset types to existing hardware and software categories to maintain consistency in financial depreciation models.
- Integrate virtual asset classification rules into CMDB schema updates, ensuring compatibility with incident and change management workflows.
Module 2: Discovery and Inventory of Virtualized Environments
- Configure agent-based versus agentless discovery tools to capture virtual machine metadata without impacting host performance in production clusters.
- Resolve discrepancies between cloud provider inventory APIs and internal discovery tools when shadow VMs are provisioned outside approved channels.
- Set scan frequency thresholds for dynamic environments where container instances spin up and down multiple times per hour.
- Correlate virtual machine UUIDs across vCenter, Azure Resource Manager, and AWS EC2 to eliminate duplicate records in the asset repository.
- Address discovery gaps in serverless and containerized environments where traditional IP-based scanning fails to detect runtime instances.
- Implement secure credential rotation for discovery tools accessing virtualization management interfaces without storing static admin passwords.
Module 3: Lifecycle Management of Virtual Machines and Containers
- Define automated retirement triggers for virtual machines based on CPU utilization, inactivity duration, and owner attestation cycles.
- Enforce standardized provisioning workflows through self-service portals to prevent unapproved VM sprawl in VMware and Hyper-V environments.
- Integrate virtual machine lifecycle stages (provision, patch, migrate, decommission) into existing change management processes.
- Coordinate container image lifecycle policies with DevOps teams to ensure only approved base images are deployed in production.
- Track virtual machine migrations between clusters and data centers to maintain accurate location and support data residency compliance.
- Implement quarantine procedures for virtual assets flagged during security scans prior to reintegration into the production environment.
Module 4: License Compliance and Software Asset Management in Virtualized Infrastructure
- Apply licensing rules for virtualized Microsoft Windows Server instances based on core count, host licensing, or subscription models.
- Monitor vCPU allocation changes in dynamic environments to prevent unintentional license overuse for per-core licensed software.
- Enforce license boundary controls in VMware vSphere using DRS rules and VM-Host affinity to restrict movement across licensed hosts.
- Reconcile Oracle license requirements for virtual processors using hard partitioning evidence in IBM PowerVM or Oracle VM.
- Track containerized software deployments to identify unlicensed commercial software embedded in public Docker images.
- Conduct periodic license position reviews that include virtual machine snapshots and archived instances in backup repositories.
Module 5: Cost Attribution and Chargeback for Virtual Resources
- Allocate compute costs for shared virtual hosts using weighted metrics such as vCPU, memory, and storage IOPS consumption.
- Implement tagging policies in AWS and Azure to associate virtual machine costs with business units, projects, and cost centers.
- Resolve disputes over chargeback allocations when development teams use shared test environments with mixed ownership.
- Adjust cost models to reflect reserved instance discounts and sustained usage savings in cloud billing reports.
- Generate monthly cost reports that differentiate between committed, variable, and idle virtual resource spending.
- Integrate virtual infrastructure cost data into enterprise financial systems using standardized cost object codes and GL mappings.
Module 6: Security and Access Governance for Virtual Assets
- Enforce role-based access controls (RBAC) on virtualization management platforms to prevent unauthorized VM creation or snapshot access.
- Automate security group and NSG reviews for virtual networks to eliminate stale firewall rules on decommissioned instances.
- Implement just-in-time access for administrative privileges on critical virtual machines to reduce standing access risks.
- Validate that VM snapshots do not contain sensitive data and enforce encryption for all stored image copies.
- Integrate virtual machine provisioning events into SIEM systems to detect anomalous behavior such as bulk VM creation.
- Conduct access recertification campaigns for virtualization platform accounts aligned with HR offboarding processes.
Module 7: Integration of Virtual Assets with IT Service Management
- Link virtual machine records in the CMDB to incident tickets to enable root cause analysis during hypervisor-level outages.
- Synchronize virtual asset changes with change management systems to ensure all VM modifications are pre-approved and documented.
- Configure event management tools to suppress alerts for VMs in maintenance mode during planned patching windows.
- Map virtual host dependencies to business services for accurate impact assessment during disaster recovery testing.
- Update service catalogs to reflect available virtual machine configurations and associated approval workflows.
- Ensure backup and restore operations for virtual machines are tracked as configuration items with defined recovery time objectives.
Module 8: Optimization and Rationalization of Virtual Infrastructure
- Conduct rightsizing assessments to identify over-allocated virtual machines and recommend downsizing without performance impact.
- Consolidate underutilized virtual hosts to improve hardware efficiency and reduce power and licensing costs.
- Establish performance baselines for critical VMs to differentiate between normal fluctuations and capacity constraints.
- Evaluate the feasibility of migrating persistent workloads from public cloud VMs to reserved or bare-metal instances.
- Implement automated scaling policies for stateless applications while maintaining asset accountability during scale events.
- Report on virtual-to-physical server ratios to executive stakeholders as a metric of infrastructure efficiency and consolidation success.