Security Assurance Requirements for Hypervisor Deployment Features
Virtualized hosts provide abstraction of the hardware resources (i.e., CPU, Memory etc) enabling multiple computing stacks to be run on a single physical machine. The Hypervisor is the core software that enables this virtualization and hence must be configured to ensure security robustness for the entire virtualization infrastructure. Among the various combination of hypervisor types and hypervisor hardware platforms, we have chosen a reference architecture as the basis for our set of deployment features. For each deployment feature, this paper looks at the configuration options and analyzes the security implications of the options/deployment feature to derive a set of assurance requirements that are (a) provided by each of the configuration options Or (b) are required for that deployment feature as a whole regardless of configuration options.
February 24-March 1, 2013
The Seventh International Conference on Digital Society (ICDS 2013)
Security Assurance Requirements for Hypervisor Deployment Features, The Seventh International Conference on Digital Society (ICDS 2013), Nice, -1, [online], https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=912746
(Accessed May 28, 2023)