Show Table of Contents Hide Table of Contents English 日本語 English Multi-page HTML Single-page HTML PDF ePub Virtualization Security Guide1. Introduction1.1. Virtualized and Non-Virtualized Environments1.2. Why Virtualization Security Matters1.3. Leveraging SELinux with sVirt2. Host Security2.1. Why Host Security Matters2.1.1. Security Concerns when Adding Block Devices to a Guest2.1.2. SELinux and Virtualization2.1.3. SELinux2.1.4. Virtualization Firewall Information2.2. Host Security Recommended Practices for Red Hat Enterprise Linux2.2.1. Special Considerations for Public Cloud Operators3. Guest Security3.1. Why Guest Security Matters3.2. Guest Security Recommended Practices4. sVirt4.1. Introduction4.2. SELinux and Mandatory Access Control (MAC)4.3. sVirt Configuration4.4. sVirt Labeling4.4.1. Types of sVirt Labels4.4.2. Dynamic Configuration4.4.3. Dynamic Configuration with Base Labeling4.4.4. Static Configuration with Dynamic Resource Labeling4.4.5. Static Configuration without Resource Labeling5. Network Security in a Virtualized Environment5.1. Network Security Overview5.2. Network Security Recommended Practices5.2.1. Securing Connectivity to Spice5.2.2. Securing Connectivity to StorageA. Further InformationA.1. SELinux and sVirtA.2. Virtualization SecurityB. Revision HistoryLegal Notice A.2. Virtualization Security Further information on virtualization security: NIST (National Institute of Standards and Technology) full virtualization security guidelines: http://www.nist.gov/itl/csd/virtual-020111.cfm. A.1. SELinux and sVirt B. Revision History Where did the comment section go?Red Hat's documentation publication system recently went through an upgrade to enable speedier, more mobile-friendly content. We decided to re-evaluate our commenting platform to ensure that it meets your expectations and serves as an optimal feedback mechanism. During this redesign, we invite your input on providing feedback on Red Hat documentation via the discussion platform.