The guest operating system that runs in the virtual machine is subject to the same security risks as a physical system. Secure virtual machines like physical machines, and follow best practices discussed in this document and in the Security Configuration Guide (formerly known as the Hardening Guide).

The Security Configuration Guide is available at https://core.vmware.com/security.