You are evaluating the security of VM1, VM2, and VM3 in Sub2