Security Requirements Flashcards
▪ Threat attempts to get out of an isolated VM and send commands to the
underlying hypervisor
▪ Is easier to perform on a Type II hypervisor than a Type I
hypervisor
● Patched
● Up to date
VM Escape
Threat attempts to move from one VM to another on the same host
VM Hopping
Occurs when an attacker circumvents sandbox protections to gain access
to the protected OS or other privileged processes
Sandbox Escape
▪ Sends the virtual machine from one host to another while it is running
▪ Ensure that live movement only occurs on a trusted network or utilizes
encryption
Live Migration
▪ Leftover pieces of data that may exist in the hard drive which are no
longer needed
● Encrypt virtual machine storage location
● Destroy encryption key
Data Remnants
Uncontrolled deployment of virtual machines
VM Sprawl