Information technology. Security techniques. Requirements for establishing virtualized roots of trust. (1st November 2022)