Today, virtualization technology is ubiquitously woven into nearly every technical field and conversation, taking place in the world of Information Technology (IT), because it can provide various benefits in terms of cost effectiveness, availability, hardware utilization, resource protection, remote access, and other capability enhancements. As a result, the implications of virtual computing environments become profound and drive a shift in the fundamentals of information systems design, operation, and management. However, virtualization also introduces new challenges and concerns related to implementing secure virtualized computing environments. Therefore, in this paper we first discuss common exploits of security properties in virtualized computing environments and analyze their security vulnerabilities from the perspective of attackers. Consequently, we identify and discuss the main areas of virtualized information system design and operation in which security concerns must be addressed. Finally, we present our recommendations and future trends for trusted virtualized computing environments.