One of the primary advantages of cloud computing is that enterprises can move applications that consist of several
virtual machines to the cloud provider when the physical environment requires additional processor or compute
resources. These bursting virtual machines need security policies and baseline histories to move with them. When a
virtual machines moves, if the security policy does not accompany it, that virtual machines becomes vulnerable. In
addition, when virtual machines move, they lose their performance histories and administrators must re-evaluate the
virtual machine performance baselines.