Date Published: January 2011
Author(s)
Karen Scarfone (G2), Murugiah Souppaya (NIST), Paul Hoffman (Virtual Private Network Consortium)
The purpose of SP 800-125 is to discuss the security concerns associated with full virtualization technologies for server and desktop virtualization, and to provide recommendations for addressing these concerns. Full virtualization technologies run one or more operating systems and their applications on top of virtual hardware. Full virtualization is used for operational efficiency, such as in cloud computing, and for allowing users to run applications for multiple operating systems on a single computer.
The purpose of SP 800-125 is to discuss the security concerns associated with full virtualization technologies for server and desktop virtualization, and to provide recommendations for addressing these concerns. Full virtualization technologies run one or more operating systems and their...
See full abstract
The purpose of SP 800-125 is to discuss the security concerns associated with full virtualization technologies for server and desktop virtualization, and to provide recommendations for addressing these concerns. Full virtualization technologies run one or more operating systems and their applications on top of virtual hardware. Full virtualization is used for operational efficiency, such as in cloud computing, and for allowing users to run applications for multiple operating systems on a single computer.
Hide full abstract
Keywords
Virtualization; hypervisor; VMM; virtual machine; VM; cloud computing
Control Families
Access Control;
Configuration Management;
Planning;
Risk Assessment;
System and Communications Protection;
System and Information Integrity;