Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

ITL Bulletin April 2011

Full Virtualization Technologies: Guidelines for Secure Implementation and Management

Date Published: April 2011

Author(s)

Shirley Radack (NIST)

Abstract

Keywords

desktop computers; full virtualization; guest operating systems; hardware; hypervisor; information security; information systems security; operating systems; risks; security management; security threats; servers; system development life cycle; system software; system vulnerabilities; virtual machine; virtualization
Control Families

None selected

Documentation

Publication:
April 2011 ITL Bulletin

Supplemental Material:
None available

Topics

Technologies
cloud & virtualization