Book Image

Mastering VMware vSphere 6.7, - Second Edition

By : Martin Gavanda, Andrea Mauro, Paolo Valsecchi, Karel Novak
Book Image

Mastering VMware vSphere 6.7, - Second Edition

By: Martin Gavanda, Andrea Mauro, Paolo Valsecchi, Karel Novak

Overview of this book

vSphere 6.7 is the latest release of VMware’s industry-leading, virtual cloud platform. It allows organisations to move to hybrid cloud computing by enabling them to run, manage, connect and secure applications in a common operating environment. This up-to-date, 2nd edition provides complete coverage of vSphere 6.7. Complete with step-by-step explanations of essential concepts, practical examples and self-assessment questions, you will begin with an overview of the products, solutions and features of the vSphere 6.7 suite. You’ll learn how to design and plan a virtual infrastructure and look at the workflow and installation of components. You'll gain insight into best practice configuration, management and security. By the end the book you'll be able to build your own VMware vSphere lab that can run even the most demanding of workloads.
Table of Contents (22 chapters)
Free Chapter
1
Section 1: Getting Started
8
Section 2: Managing Resources
13
Section 3: Advanced Topics
18
Section 4: Building Your Lab Environment

Securing and Protecting Your Environment

One of the pillars of virtualization is the VM isolation property, which can protect the host layer from the VM effectively. Although some possible attacks have been found, virtualization remains an exciting approach to improve the security of your infrastructure. Securing and hardening your vSphere infrastructure should be considered one of the most important steps toward making your infrastructure as reliable as possible.
A new trend is now also to protect VMs from the underlying infrastructure; for example, in the case of a public cloud service, consumers may have some concerns about the security and privacy of their data. VMware offers different encryption mechanisms that make your data private no matter where they are being run.

This chapter will cover the following topics:

  • Tuning and hardening guidelines
  • vCenter and ESXi security...