A virtual machine must not have access to information of the host machine.
This requirement is verified in following services
- CAPEC™-115. Authentication bypass
- BSAFSS-TC_1-6. Developed software using security tools
- SWIFT CSCF-1_3. Virtualization platform protection
Search for vulnerabilities in your apps for free with our automated security testing! Start your 21-day free trial and discover the benefits of our Continuous Hacking Machine Plan. If you prefer a full service that includes the expertise of our ethical hackers, don't hesitate to contact us for our Continuous Hacking Squad Plan.