A:
- Hypervisor security configuration.
- Virtual network security.
- Security of server images.
- Denial of Service (DoS) attacks on underlying hardware.
- Loss of separation of duties among server administrators.
- Disaster recovery scenarios.
- Access control to host & guest servers.
- Building configuration, security and corporate standards into common virtual server images.
- Remote access/configuration issues on headless servers.