US government 5G Cybersecurity Practice Guide, by National Cybersecurity Center of Excellence (NCCoE)

Trusted Cloud Security Practice Guide for VMware Hybrid Cloud Infrastructure as a Service (IaaS) Environments, NIST Special Publication 1800-19A.

NIST SPECIAL PUBLICATION 1800-33B, 5G Cybersecurity. Volume B: Approach, Architecture, and Security Characteristics

NIST SPECIAL PUBLICATION 800-190, Application Container Security Guide

UK government Telecommunications Security Bill of 2020.

Security Analysis for the UK Telecom Sector: Summary of Findings, by the National Cyber Security Centre, January 2020.

The future of telecoms in the UK, blog post by NCSC Technical Director Dr. Ian Levy, Published 28 January 2020.

5G PPP Phase 1 Security Landscape, Produced by the 5G PPP Security WG, June 2017.

The future of telecoms in the UK, blog post by NCSC Technical Director Dr. Ian Levy, 28 January 2020.

Security imperatives for digital transformation, By Patrick Donegan, published on TM Forum, August 2019.

vSphere Security, December 2023.

Protecting VM Register State with SEV-ES. AMD, David Kaplan, February 2017.

Secure Virtual Network Configuration for Virtual Machine (VM) Protection, NIST Special Publication 800-125B.

Application Container Security Guide, NIST Special Publication 800-190, by Murugiah Souppaya, Computer Security Division Information Technology Laboratory; John Morello, Twistlock, Baton Rouge, Louisiana; Karen Scarfone, Scarfone Cybersecurity, Clifton, Virginia. September 2017.

Security Assurance Requirements for Linux Application Container Deployments, NIST.IR 8176, by Ramaswamy Chandramouli, Computer Security Division, Information Technology Laboratory. October 2017.

VMware vSphere Virtual Machine Encryption: Virtual Machine Encryption Management, December 2017 white paper, VMware.

VMware Security Hardening Guides

Security Best Practices and Resources for VMware Virtualization Infrastructure

VMware NSX-T 3.2 Security Configuration Guide

vSphere Security Documentation, Guides, and Resources

Understanding vSphere Hardening and Compliance

Create an IP Pool with VMware NSX

Security Considerations for vRealize Log Insight

Micro-segmentation for Dummies, by Lawrence Miller and Joshua Soto, John Wiley & Sons, Inc. 2015.

VMware NSX Micro-segmentation Day 1, by Wade Holmes, VMware Press, 2017.