Some VM security policies have already been discussed; others, related to DoS attacks, will be discussed in the next section.