Virtualized System Clause Samples
Virtualized System. All Intrusion Detection Systems in place should be configured to provide data on demand,to identify sources of a potential attack/intrusion at the network perimeter. • Systems should have the ability to detect a potential hostile attack. Examples include but are not limited to: Network Intrusion Detection or Host Intrusion Detection/Prevention. • Any single image of data classified as Confidential defines the minimum-security requirement for all virtual instances on the same host system. • Virtualized systems may contain data classified as Confidential Information. (c) Applications thatrequire physical separation cannot be on the same host system.
