Published: February 24, 2013
Author(s)
Ramaswamy Chandramouli
Conference
Name: Seventh International Conference on Digital Society (ICDS 2013)
Dates: February 24 - March 1, 2013
Location: Nice, France
Citation: ICDS 2013, the Seventh International Conference on Digital Society, pp. 120-125
Announcement
Virtualized hosts provide abstraction of the hardware resources (i.e., CPU, Memory etc) enabling multiple computing stacks to be run on a single physical machine. The Hypervisor is the core software that enables this virtualization and hence must be configured to ensure security robustness for the entire virtualization infrastructure. Among the various combination of hypervisor types and hypervisor hardware platforms, we have chosen a reference architecture as the basis for our set of deployment features. For each deployment feature, this paper looks at the configuration options and analyzes the security implications of the options/deployment feature to derive a set of assurance requirements that are (a) provided by each of the configuration options Or (b) are required for that deployment feature as a whole regardless of configuration options.
Virtualized hosts provide abstraction of the hardware resources (i.e., CPU, Memory etc) enabling multiple computing stacks to be run on a single physical machine. The Hypervisor is the core software that enables this virtualization and hence must be configured to ensure security robustness for the...
See full abstract
Virtualized hosts provide abstraction of the hardware resources (i.e., CPU, Memory etc) enabling multiple computing stacks to be run on a single physical machine. The Hypervisor is the core software that enables this virtualization and hence must be configured to ensure security robustness for the entire virtualization infrastructure. Among the various combination of hypervisor types and hypervisor hardware platforms, we have chosen a reference architecture as the basis for our set of deployment features. For each deployment feature, this paper looks at the configuration options and analyzes the security implications of the options/deployment feature to derive a set of assurance requirements that are (a) provided by each of the configuration options Or (b) are required for that deployment feature as a whole regardless of configuration options.
Hide full abstract
Keywords
virtual machine; virtual network; hypervisor; virtualized host; security assurance requirements
Control Families
None selected