NIST 800-53 REV 5 • SYSTEM AND COMMUNICATIONS PROTECTION
SC-30(1) — Virtualization Techniques
CMMC Practice Mapping
No direct CMMC mapping
NIST 800-171 Mapping
No direct NIST 800-171 mapping
Related Controls
No related controls listed
Practitioner Notes
Use virtualization to support concealment — move virtual machines between physical hosts, change IP addresses, and reconfigure the virtual environment to present a moving target.
Example 1: Use VMware vMotion or Hyper-V Live Migration to periodically move critical VMs to different physical hosts. An attacker who has fingerprinted the hardware characteristics of a specific host finds their reconnaissance is outdated.
Example 2: Use DHCP with short lease times for server VMs in development environments so IP addresses change regularly. Combine this with DNS service discovery so legitimate clients always find the right server regardless of IP changes.