Security considerations when running a VM: Difference between revisions