The document outlines a methodology for securing virtual networks within virtualized infrastructures, emphasizing the need for proper security configurations to support multi-tier applications and Infrastructure as a Service (IaaS) public cloud services. It details specific steps to identify use cases, associated security requirements, and analysis of potential security solutions for virtual networks. The methodology aims to provide a structured approach to secure virtual network configurations that consider both deployment scenarios and technical requirements.