All these new layers, devices and traffic require management and protection just as they would if they were physical machines and networks. But what do auditors need to know in order to successfully locate and ensure secure processes around sensitive data traversing this new vir- tual environment? Unfortunately, at this early stage of adoption, there is little guidance within the regulatory frameworks on how to address new audit issues presented with virtualization. The purpose of this paper is to help IT managers and auditors.