The Center for Internet Security have released version 1.0 of their benchmarks for securing Virtual Machines. CIS produce many excellent resources on how to secure various operating systems and devices on your network and this is another valuable guide in that series. Anyone considering deploying Virtual Machines in their environment would do well to review this guide first. Remember though to test the configuration changes before deploying them into a production environment.
