Are you talking about hacking the VM from the physical host?
At a previous place of work we looked at whether storage used by one VM could be accessible unintentionally after the VM was destroyed. The conclusion we reached was encrypting the storage and making sure the means of decryption died with the VM would be as much as we could do.