How can cloud providers support a secure use of virtualization for cloud consumers?
How can cloud providers support a secure use of virtualization for cloud consumers?
Cloud providers can support a secure use of virtualization for cloud consumers by ensuring a secure chain of processes from the image used to run the virtual machine through to a boot process with security and integrity. This approach ensures that machines are launched based on authorized images, and running virtual machines are as expected, providing a secure and dependable environment for the consumer.
Security guidance page 93: "Cloud providers should also support secure use of virtualization for cloud users. This means creating a secure chain of processes from the image (or other source) used to run the virtual machine all the way through a boot process with security and integrity. This ensures that tenants cannot launch machines based on images that they shouldn’t have access to, such as those belonging to another tenant, and that a running virtual machine (or other process) is the one the customer expects to be running."
B is the only logical answer