NIST 800-53 REV 5 • SYSTEM AND COMMUNICATIONS PROTECTION

SC-30(1)Virtualization Techniques

CMMC Practice Mapping

No direct CMMC mapping

NIST 800-171 Mapping

No direct NIST 800-171 mapping

Related Controls

No related controls listed

Practitioner Notes

Use virtualization to support concealment — move virtual machines between physical hosts, change IP addresses, and reconfigure the virtual environment to present a moving target.

Example 1: Use VMware vMotion or Hyper-V Live Migration to periodically move critical VMs to different physical hosts. An attacker who has fingerprinted the hardware characteristics of a specific host finds their reconnaissance is outdated.

Example 2: Use DHCP with short lease times for server VMs in development environments so IP addresses change regularly. Combine this with DNS service discovery so legitimate clients always find the right server regardless of IP changes.