Consider basic security recommendations when creating and configuring hosts and virtual machines.