
Abstract
The purpose of the guide is to discuss the security concerns associated with full virtualization technologies for server and desktop virtualization, and to provide recommendations for addressing these concerns. All forms of virtualization other than server and desktop full virtualization are outside the scope of this document.
Most existing recommended security practices remain applicable in virtual environments. The practices described in this document build on and assume the implementation of practices described in other NIST publications.
General Information
Publication date: 03 January 2011
ICT rolling plan topic: Cloud computing
SDO: NIST
Latest publishied version: https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=2ahUKEwiB4e302broAhUzQkEAHaJ3AFQQFjAAegQIBhAB&url=https%3A%2F%2Fnvlpubs.nist.gov%2Fnistpubs%2FLegacy%2FSP%2Fnistspecialpublication800-125.pdf&usg=AOvVaw2z__tbF_WCyh04t-HXUUrE