A:
- Use virtual savings to fund security gaps in physical world.
- Use the same tools and procedures to manage the virtual world as you do in the physical world.
- Don't allow less security in the virtual world than you have in the physical world.
- Carefully consider configuration management of the virtual machines.