Statements (49)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Information Security Discipline
|
gptkbp:address |
gptkb:Access_Control
gptkb:VM_Escape Patch Management Compliance Data Leakage Hypervisor Attacks Inter-VM Attacks Isolation of Virtual Machines Live Migration Security Management Interface Security Monitoring and Logging Resource Contention Snapshot Security |
gptkbp:appliesTo |
gptkb:Data_Centers
gptkb:Network_Functions_Virtualization Cloud Computing Desktop Virtualization Server Virtualization |
gptkbp:concerns |
gptkb:Zero_Trust_Security
Vulnerability Management Incident Response Configuration Management Threat Detection Security Auditing Security Automation Security Best Practices Microsegmentation Least Privilege Security Hardening |
gptkbp:focusesOn |
Securing Virtualized Environments
|
https://www.w3.org/2000/01/rdf-schema#label |
Virtualization Security
|
gptkbp:includes |
Hypervisor Security
Network Virtualization Security Storage Virtualization Security Virtual Machine Security |
gptkbp:relatedTo |
gptkb:Infrastructure_as_a_Service
gptkb:Java_Virtual_Machine gptkb:cloud_service gptkb:Information_Security Cloud Security |
gptkbp:uses |
gptkb:Role-Based_Access_Control
gptkb:Virtual_Firewalls Intrusion Detection Systems Encryption Segmentation Security Policies |
gptkbp:bfsParent |
gptkb:Shielded_Virtual_Machines
|
gptkbp:bfsLayer |
6
|