Statements (49)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Information_Security_Discipline
|
| gptkbp:address |
gptkb:Access_Control
gptkb:VM_Escape Patch Management Compliance Data Leakage Hypervisor Attacks Inter-VM Attacks Isolation of Virtual Machines Live Migration Security Management Interface Security Monitoring and Logging Resource Contention Snapshot Security |
| gptkbp:appliesTo |
gptkb:Data_Centers
gptkb:Network_Functions_Virtualization Cloud Computing Desktop Virtualization Server Virtualization |
| gptkbp:concerns |
gptkb:Zero_Trust_Security
Vulnerability Management Incident Response Configuration Management Threat Detection Security Auditing Security Automation Security Best Practices Microsegmentation Least Privilege Security Hardening |
| gptkbp:focusesOn |
Securing Virtualized Environments
|
| gptkbp:includes |
Hypervisor Security
Network Virtualization Security Storage Virtualization Security Virtual Machine Security |
| gptkbp:relatedTo |
gptkb:Infrastructure_as_a_Service
gptkb:Java_Virtual_Machine gptkb:cloud_service gptkb:Information_Security Cloud Security |
| gptkbp:uses |
gptkb:Role-Based_Access_Control
gptkb:Virtual_Firewalls Intrusion Detection Systems Encryption Segmentation Security Policies |
| gptkbp:bfsParent |
gptkb:Shielded_Virtual_Machines
|
| gptkbp:bfsLayer |
6
|
| https://www.w3.org/2000/01/rdf-schema#label |
Virtualization Security
|