Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Guide to Security for Full Virtualization Technologies

Published

Author(s)

Murugiah P. Souppaya, Karen Scarfone, Paul Hoffman

Abstract

The purpose of SP 800-125 is to discuss the security concerns associated with full virtualization technologies for server and desktop virtualization, and to provide recommendations for addressing these concerns. Full virtualization technologies run one or more operating systems and their applications on top of virtual hardware. Full virtualization is used for operational efficiency, such as in cloud computing, and for allowing users to run applications for multiple operating systems on a single computer.
Citation
Special Publication (NIST SP) - 800-125
Report Number
800-125

Keywords

virtualization, hypervisor, VMM, virtual machine, VM, cloud computing

Citation

Souppaya, M. , Scarfone, K. and Hoffman, P. (2011), Guide to Security for Full Virtualization Technologies, Special Publication (NIST SP), National Institute of Standards and Technology, Gaithersburg, MD, [online], https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=907776 (Accessed October 6, 2024)

Issues

If you have any questions about this publication or are having problems accessing it, please contact reflib@nist.gov.

Created January 28, 2011, Updated April 9, 2020