Revisit Appendix W: Virtualization
Please describe the scope. We need to revisit and focus on the risks of virtualization and potentially exposed information from the guest VM.
Please describe the solution. We can/should add:
- common processes;
- registry keys;
- VMWare tools;
- and other things that are common vectors for identification of virtualization.