Security Overview of the Integrity Virtual Machines Architecture
Security Overview of the
Integrity Virtual Machines Architecture
Introduction ...................................................................................................................................2
Integrity Virtual Machines Architecture................................................................................................2
Virtual Machine Host System.........................................................................................................2
Virtual Machine Control............................................................................................................2
Scheduling Access to Physical Resources .....................................................................................3
Virtual Machines.........................................................................................................................3
Virtual Machine Monitor...............................................................................................................3
Virtual Ethernet Switches...............................................................................................................4
Processor Virtualization ...................................................................................................................4
Memory Virtualization.....................................................................................................................4
Storage Virtualization......................................................................................................................5
Virtual Networking..........................................................................................................................5
Virtual Ethernet Switches...............................................................................................................5
Virtual Network Interface Cards.....................................................................................................6
Virtual Machine Management...........................................................................................................7
Command Line Interface...............................................................................................................7
Graphical User Interface ..............................................................................................................8
Customizable Roles for Access and Management .............................................................................8
General Security for the VM Host System............................................................................................8
Conclusion....................................................................................................................................9
For more information.......................................................................................................................9