Security Overview of the Integrity Virtual Machines Architecture

7
Figure 1 - Isolating virtual machines to separate network trust domains
Virtual Machine Management
Integrity virtual machines enable configuration and monitoring through a full-featured command line
interface (CLI). Additionally, the Virtual Server Environment suite of tools provides a browser-based,
graphical user interface (GUI) to Integrity VM.
The CLI is available to privileged users on the physical VM Host system. Virtual machine
management, monitoring, and console access is provided with the CLI.
Command Line Interface
The Integrity VM CLI provides for management of virtual machines residing on a given physical system
through secure login to that system. Network connectivity to a third-party system (e.g., a management
system) is not required to use the CLI. All options and option parameters are validated for
appropriate length and character set before actual execution of the task. Pathnames are also
validated for existence as well as appropriate device type corresponding to any paths provided.
Integrity VM logs all command-line execution along with success or failure diagnostics, user name,
and time of execution.