Product SiteDocumentation Site

1.3. Three Way Model

A three-way conceptual model, CIA (Confidentiality, Integrity, Availability) is often used in general computing security. A similar model can be presented in addition to this model when analyzing virtualization security: IPL (Isolate, Protect, Log), as shown in the following diagram:
Isolate
Controlling interactions between virtual machines is crucial to maintaining a high level of security. This is provided in Fedora by sVirt.
Protect
Virtualized machines are not immune to traditional security threats. Each virtual machine should be managed with regular security controls.
Log
Virtual machines are simple to deploy. The lack of logging, change management and audit trails in a virtualized environment can easily lead to a sprawling, unmanaged and insecure environment.