Skip to main content

Advances, Systems and Applications

Table 1 Mapping of VM’s life cycle threats and security solution [9]

From: Security transparency: the next frontier for security research in the cloud

Threats

VM Life cycle stage

Security solutions

NA

Image definition

NA

NA

Image Creation

NA

NA

Image Customisation

NA

Threats 4and 5

Transportation

Cryptographic protection

Threats 1–5

Storage

Cryptographic protection

Threats 1, 2, 3 and 5

Deployment

Encrypted boot and data partition Custom binding

Threats 1-6

Contextualisation

Custom binding

Threats 1, 3,4,5,6 and 7

Runtime

Deviation from “normal”

Threats 2, 3 and 5

Undeployment

VM introspection (VM memory consistency checks