1. The former Red Hat employee focused on the security of the hypervisor as an area that needed examination.
2. A cloud provider can log in to their hypervisor and then read all the memory of your running guests.
3. In contrast, a traditional virtualization hypervisor requires an operating system for each virtual machine.
4. The promise of guest virtual machine isolation is a core element of virtualization hypervisor security.
5. Whoever owns the hypervisor potentially owns the guests, and your cloud provider owns the hypervisor.
6. The Xen hypervisor has excellent performance and deploying a new VM from a template is a lightning fast operation.
7. Virtualization hypervisor technology is supposed to isolate virtual machines from the underlying operating system.