Virtualization

Virtualization infrastructures are a prime target for attackers seeking quick, widespread access to the data and applications hosted therein. However, a number of best practices can help to reduce the risks and consequences of a virtualized IS’s compromise.

Publish the 26 September 2024 Updated 26 September 2024
Back to basics - Virtualization

ANSSI Back to Basics aim to enlighten all our readers, whatever their level of technical knowledge, on the major challenges of cybersecurity. They reflect the agency's point of view at the time of publication, and are not intended as detailed recommendations, like our guides. Rather, they set out independent best practices that can be implemented in a complementary manner. These recommendations are likely to be regularly updated in line with developments in the threat environment, the technologies used, our feedback, etc.