Guide to Security for Full
Virtualization Technologies
Recommendations of the National Institute
of Standards and Technology
Karen Scarfone
Murugiah Souppaya
Paul Hoffman
Special Publication 800 -125
NIST Special Public ation 800 -125
Guide to Security for Full Virtualization
Technologies
Recommendations of the National
Institute of Standards and Tec hnology
Karen Scarfone
Murugiah Souppaya
Paul Hoffman
C O M P U T E R S E C U R I T Y
Computer Security Division
Informa tion Technology Laboratory
National Institute of Standards and Technology
Gaithersburg, MD 20899- 8930
January 2011
U.S. Department of Commerce
Gary Locke , Secretary
National Institute of Standards and Technology
Patrick D. Gallagher , Director GUIDE TO SECURITY FOR FULL VIRTUALIZATION TECHNOLOGIES
ii
Reports on Computer Systems Technology
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology
(NIST) promotes the U.S. economy and public welfare by providing tec hnical leadership for the nation’s
measurement and standards infrastructure. ITL d evelops tests, test methods, reference data, proof of
concept implementations, and technical analysis to advance the devel opment and productive use of
information technology. ITL’s responsibilities include the development of technical, physical,
administrative, and management standards and guid elines for the cost -effective security and privacy of
sensitive unclassified information in Federal computer sy stems. This Special Publication 800- series
reports on ITL’s research, guidance, and outreach e fforts in computer security and its collaborative
activities with industry, government, and ac ademic organizations.
Certain commercial entities, equipment, or materials may be identified in this
document in order to describe an experimental procedure or concept adequately.
Such identification is not intended to imply recommendation or endorsement by the
National Institute of S tandards and Technology, nor is it intended to imply that the
entities, materials, or equipment are necessarily the best available for the pu rpose. National Institute of Standards and Technology Special Publication 800 -125
Natl. Inst. Stand. Technol. Spec . Publ. 800 -125, 35 pages (January 2010)
GUIDE TO SECURITY FOR FULL VIRTUALIZATION TECHNOLOGIES
iii Acknowledgments
The authors, Karen Scarfone of G2, Inc ., Murugiah Souppaya of the National Institute of Standards and
Technology (NIST), and Paul Hoffman of the VPN Consortium, wish to thank their colleagues who
reviewed drafts of this document and contributed to its technical content. T he authors gratefully
acknowledge and appreciate the contributions from individuals and organizations whose comments
improved the ov erall quality of this publication.
Trademark Information
All names are trademarks or registered trademarks of their respective owners.
GUIDE TO SECURITY FOR FULL VIRTUALIZATION TECHNOLOGIES
iv Table of Contents
Executive Summary ............................................................................................................ ES-1
1. Introduction ................................................................................................................... 1-1
1.1 Authority .................................................................................................................1 -1
1.2 Purpose and Scope ................................................................................................1 -1
1.3 Audience ................................................................................................................1 -1
1.4 Document Structure ...............................................................................................1 -1
2. Introduction to Full Virtualiza tion........
NIST.SP.800-125 Guide to Security for Full Virtualization Technologies
安全标准 >
NIST >
文档预览
中文文档
35 页
50 下载
1000 浏览
0 评论
0 收藏
3.0分
温馨提示:本文档共35页,可预览 3 页,如浏览全部内容或当前文档出现乱码,可开通会员下载原始文档
本文档由 思安 于 2022-12-05 09:08:03上传分享