Five Immutable Laws of Virtualization Security