Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Overview of server virtualization
6 Overview of security threats and risks
7 Recommendations for secure VS lifecycle
8 Planning and design phase - security considerations
9 Implementation phase - security checklist
Annex A (informative) - Risk assessment for VSs
Annex B (informative) - Guidelines for implementing security
checklist items
Bibliography