We argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification With analysis of limitations Trusted Computing Group (TCG) has encountered. Putting together the VMM architecture, TCG hardware and application-oriented ldquothinrdquo virtual machine (VM), Trusted VMM-based security architecture is present in this paper with the character of reduced and distributed trusted computing base (TCB). It provides isolation and integrity guarantees based on which general security requirements can be satisfied.