Are you attending Black Hat or Def Con? Book a meeting

Young hacker smiling

Zero false positives

Expert intelligence + effective automation

REQ.218 Control access to virtual machines

This document contains the details of the security requirements related to the definition and management of hypervisors and virtual machines. This requirement establishes the importance of controlling access to virtual machines using a security support virtual machine.

Requirement

If the hypervisor allows CPU memory and registers check between virtual machines, all access must be controlled through a unique virtual machine of security support.


Service status - Terms of Use