In addition to securing the physical layers, which include the hardware, the switches, and so on, you must secure the virtual layers. Secure the virtual machines, including the operating system and the virtual networking layer.