STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Virtual Machine Manager Security Requirements Guide

V-207412

CAT II (Medium)

All interactions among guest VMs must be mediated by the VMM or its service VMs to support proper function.

Rule ID

SV-207412r1138003_rule

STIG

Virtual Machine Manager Security Requirements Guide

Version

V2R3

CCIs

CCI-001368

Discussion

Mechanisms to detect and prevent unauthorized communication flow must be configured or provided as part of the VMM design. If information flow control is not enforced based on proper functioning of the VMM and its service, helper, and guest VMs, the VMM may become compromised. Information flow control regulates where information is allowed to travel within a VMM. The flow of all system information must be monitored and controlled so it does not introduce any unacceptable risk to the VMM, its guest VMs, or data. This requirement also applies to Zero Trust initiatives.

Check Content

Verify all interactions among guest VMs are mediated by the VMM or its service VMs to support proper function.

If they are not, this is a finding.

Fix Text

Configure all interactions among guest VMs to be mediated by the VMM or its service VMs to support proper function.