The instance where an attacker successfully breaches a virtual machine’s confines to interact with the host system. By exploiting vulnerabilities within the virtual machine environment, attackers may breach the separation boundary, leading to the compromise of other virtual machines hosted on the same physical system.
Categories: CC D5: Security Operations | CISM D3: Information Security Program | CISSP D3: Security Architecture and Engineering
« Back to Glossary Index