How can virtual machine communications bypass network security controls?
VM communications may use a virtual network on the same hardware host
The guest OS can invoke stealth mode
Hypervisors depend upon multiple network interfaces
VM images can contain rootkits programmed to bypass firewalls
Most network security systems do not recognize encrypted VM traffic
Submit