Microsoft Hyper-V Security recommendations
Below are key resources for improving Hyper-V security
Simple Security Recommendations When Using Hyper-V
QUOTE: Microsoft has a few articles on TechNet that outline some of the key aspects of a secure deployment of the Hyper-V virtualization technology, a feature of Windows Server 2008 R2.
Microsoft Hyper-V Security Best Practices
-- Use a Server Core installation of Windows Server 2008 for the management operating system.
-- Do not run any applications in the management operating system—run all applications on virtual machines.
-- Use the security level of your virtual machines to determine the security level of your management operating system.
-- Do not give virtual machine administrators permissions on the management operating system.
-- Ensure that virtual machines are fully updated before they are deployed in a production environment.
-- Ensure integration services are installed on virtual machines.
-- Use a dedicated network adapter for the management operating system of the virtualization server.
-- Use BitLocker Drive Encryption to help protect resources.