Book Image

Mastering VMware vSphere 6.5

Book Image

Mastering VMware vSphere 6.5

Overview of this book

VMware vSphere 6.5 provides a powerful, flexible and secure foundation for next-generation applications which helps you create an effective digital transformation. This book will be based on VMware vSphere 6.5 which empowers you to virtualize any complex application with ease. You’ll begin by getting an overview of all the products, solutions and features of the vSphere 6.5 suite, comparing the evolutions with the previous releases. Next ,you’ll design and plan a virtualization infrastructure to drive planning and performance analysis. Following this , you will be proceeding with workflow and installation of components. New network trends are also covered which will help you in optimally designing the vSphere environment. You will also learn the practices and procedures involved in configuring and managing virtual machines in a vSphere infrastructure. With vSphere 6.5, you’ll make use of significantly more powerful capabilities for patching, upgrading, and managing the configuration of the virtual environment. Next we’ll focus on specific availability and resiliency solutions in vSphere. Towards the end of the book you will get information on how to save your configuration, data and workload from your virtual infrastructure. By the end of the book you’ll learn about VMware vSphere 6.5 right from design to deployment and management.
Table of Contents (15 chapters)

Security and hardening concepts in vSphere

Security is a complete process flow with an entire lifecycle; depending on the model that will be used, the first part of the process is usually product agnostic, but then there is a part dependent on the different products and their features and capabilities.

Following VMware's vision, the five pillars of cyber hygiene are as follows:

  • Least privilege: This is the common and most reasonable approach, that applies for user accounts, service accounts, and services in general (for example, used ports).
  • Micro-segmentation: Using NSX, it's finally possible to bring network control at VM level with granular security rules. Considering also the new product VMware AppDefense, VM security can be enforced at both network and application levels.
  • Encryption: Data must be protected at each level, and for the physical level, encryption is...