Virtualized hosts provide abstraction of the hardware resources (i.e., CPU, Memory etc) enabling multiple computing stacks to be run on a single physical machine. The Hypervisor is the core software that enables this virtualization and hence must be configured to ensure security robustness for the entire virtualization infrastructure. Among the various combination of hypervisor types and hypervisor hardware platforms, we have chosen a reference architecture as the basis for our set of deployment features. For each deployment feature, this paper looks at the configuration options and analyzes the security implications of the options/deployment feature to derive a set of assurance requirements that are (a) provided by each of the configuration options Or (b) are required for that deployment feature as a whole regardless of configuration options.
Conference Dates: February 24-March 1, 2013
Conference Location: Nice, -1
Conference Title: The Seventh International Conference on Digital Society (ICDS 2013)
Pub Type: Conferences
Virtual Machine, Virtual Network, Hypervisor, Virtualized Host, Security Assurance Requirements