Cloud Computing Patterns, Mechanisms > Cloud Service and Storage Security Patterns > Hypervisor Protection
Hypervisor Protection (Cope, Erl)
How can a hypervisor be secured and monitored?
The hypervisor is vulnerable to threats from multiple vectors and, if compromised, could attack any other component that is shared by the same hypervisor.
A system is established whereby mitigations are implemented from the silicon up the stack to protect against hypervisor attack vectors.
A hardened hypervisor is installed and verified using a trusted platform and mitigations are added to protect against vulnerabilities.
Burst In, Burst Out to Private Cloud, Burst Out to Public Cloud, Cloud Authentication, Cloud Balancing, Elastic Environment, Infrastructure-as-a-Service (IaaS), Isolated Trust Boundary, Multitenant Environment, Platform-as-a-Service (PaaS), Private Cloud, Public Cloud, Resilient Environment, Resource Workload Management, Secure Burst Out to Private Cloud/Public Cloud, Software-as-a-Service (SaaS)
Examples of hypervisor threat mitigations.