This bulletin summarizes the information presented in NIST SP 800-125, Guide To Security for Full Virtualization Technologies: Recommendations of the National Institute of Standards and Technology, which was written by Karen Scarfone of G2, Inc., Murugiah Souppaya of NIST, and Paul Hoffman of the VPN Consortium. The guide discusses virtualization technology, a technique for simulating the software and the hardware upon which other software runs. Organizations adopting virtualization technologies can operate their information systems more efficiently, reduce their energy, operations and maintenance costs, and spend less on hardware and space for hardware. The bulletin includes information about the forms of virtualization, how virtualization contributes to operational efficiency, the security issues that need to be addressed by organizations adopting virtualization systems, and NIST’s recommendations for the secure implementation of virtualization. The bulletin provides information about resources that are available to support organizations in their deployment of virtualization.
This bulletin summarizes the information presented in NIST SP 800-125, Guide To Security for Full Virtualization Technologies: Recommendations of the National Institute of Standards and Technology, which was written by Karen Scarfone of G2, Inc., Murugiah Souppaya of NIST, and Paul Hoffman of the...
See full abstract
This bulletin summarizes the information presented in NIST SP 800-125, Guide To Security for Full Virtualization Technologies: Recommendations of the National Institute of Standards and Technology, which was written by Karen Scarfone of G2, Inc., Murugiah Souppaya of NIST, and Paul Hoffman of the VPN Consortium. The guide discusses virtualization technology, a technique for simulating the software and the hardware upon which other software runs. Organizations adopting virtualization technologies can operate their information systems more efficiently, reduce their energy, operations and maintenance costs, and spend less on hardware and space for hardware. The bulletin includes information about the forms of virtualization, how virtualization contributes to operational efficiency, the security issues that need to be addressed by organizations adopting virtualization systems, and NIST’s recommendations for the secure implementation of virtualization. The bulletin provides information about resources that are available to support organizations in their deployment of virtualization.
Hide full abstract
Keywords
desktop computers; full virtualization; guest operating systems; hardware; hypervisor; information security; information systems security; operating systems; risks; security management; security threats; servers; system development life cycle; system software; system vulnerabilities; virtual machine; virtualization