US government 5G Cybersecurity Practice Guide, by National Cybersecurity Center of Excellence (NCCoE)
Trusted Cloud Security Practice Guide for VMware Hybrid Cloud Infrastructure as a Service (IaaS) Environments, NIST Special Publication 1800-19A.
NIST SPECIAL PUBLICATION 1800-33B, 5G Cybersecurity. Volume B: Approach, Architecture, and Security Characteristics
NIST SPECIAL PUBLICATION 800-190, Application Container Security Guide
UK government Telecommunications Security Bill of 2020.
Security Analysis for the UK Telecom Sector: Summary of Findings, by the National Cyber Security Centre, January 2020.
The future of telecoms in the UK, blog post by NCSC Technical Director Dr. Ian Levy, Published 28 January 2020.
5G PPP Phase 1 Security Landscape, Produced by the 5G PPP Security WG, June 2017.
The future of telecoms in the UK, blog post by NCSC Technical Director Dr. Ian Levy, 28 January 2020.
Security imperatives for digital transformation, By Patrick Donegan, published on TM Forum, August 2019.
vSphere Security, December 2023.
Protecting VM Register State with SEV-ES. AMD, David Kaplan, February 2017.
Secure Virtual Network Configuration for Virtual Machine (VM) Protection, NIST Special Publication 800-125B.
Application Container Security Guide, NIST Special Publication 800-190, by Murugiah Souppaya, Computer Security Division Information Technology Laboratory; John Morello, Twistlock, Baton Rouge, Louisiana; Karen Scarfone, Scarfone Cybersecurity, Clifton, Virginia. September 2017.
Security Assurance Requirements for Linux Application Container Deployments, NIST.IR 8176, by Ramaswamy Chandramouli, Computer Security Division, Information Technology Laboratory. October 2017.
VMware vSphere Virtual Machine Encryption: Virtual Machine Encryption Management, December 2017 white paper, VMware.
VMware Security Hardening Guides
Security Best Practices and Resources for VMware Virtualization Infrastructure
VMware NSX-T 3.2 Security Configuration Guide
vSphere Security Documentation, Guides, and Resources
Understanding vSphere Hardening and Compliance
Create an IP Pool with VMware NSX
Security Considerations for vRealize Log Insight
Micro-segmentation for Dummies, by Lawrence Miller and Joshua Soto, John Wiley & Sons, Inc. 2015.
VMware NSX Micro-segmentation Day 1, by Wade Holmes, VMware Press, 2017.