UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

close
Already an Engineering360 user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your Engineering360 Experience

close
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

ISO/IEC 21878

Information technology - Security techniques - Security guidelines for design and implementation of virtualized servers

active, Most Current
Buy Now
Organization: ISO
Publication Date: 1 November 2018
Status: active
Page Count: 30
ICS Code (IT Security): 35.030
scope:

This document specifies security guidelines for the design and implementation of VSs. Design considerations focusing on identifying and mitigating risks, and implementation recommendations with respect to typical VSs are covered in this document.

This document is not applicable to: (see also 5.3.2 Exclusions)

- desktop, OS, network, and storage virtualization; and

- vendor attestation.

This document is intended to benefit any organization using and/or providing VSs.

Document History

ISO/IEC 21878
November 1, 2018
Information technology - Security techniques - Security guidelines for design and implementation of virtualized servers
This document specifies security guidelines for the design and implementation of VSs. Design considerations focusing on identifying and mitigating risks, and implementation recommendations with...

References

Advertisement