Which of the following should be implemented to stop an attacker from interacting with the hypervisor through another guest?