Security

Overview

This chapter explains the security requirements that QEMU is designed to meet and principles for securely deploying QEMU.