SP 800-125. Guide to Security for Full Virtualization Technologies

  • Authors:
  • Karen A. Scarfone;Murugiah P. Souppaya;Paul Hoffman

  • Affiliations:
  • G2, Inc.;National Institute of Standards and Technology;Virtual Private Network Consortium

  • Venue:
  • SP 800-125. Guide to Security for Full Virtualization Technologies
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

The purpose of SP 800-125 is to discuss the security concerns associated with full virtualization technologies for server and desktop virtualization, and to provide recommendations for addressing these concerns. Full virtualization technologies run one or more operating systems and their applications on top of virtual hardware. Full virtualization is used for operational efficiency, such as in cloud computing, and for allowing users to run applications for multiple operating systems on a single computer.