Book Image

Mastering VMware vSphere 6.7, - Second Edition

By : Martin Gavanda, Andrea Mauro, Paolo Valsecchi, Karel Novak
Book Image

Mastering VMware vSphere 6.7, - Second Edition

By: Martin Gavanda, Andrea Mauro, Paolo Valsecchi, Karel Novak

Overview of this book

vSphere 6.7 is the latest release of VMware’s industry-leading, virtual cloud platform. It allows organisations to move to hybrid cloud computing by enabling them to run, manage, connect and secure applications in a common operating environment. This up-to-date, 2nd edition provides complete coverage of vSphere 6.7. Complete with step-by-step explanations of essential concepts, practical examples and self-assessment questions, you will begin with an overview of the products, solutions and features of the vSphere 6.7 suite. You’ll learn how to design and plan a virtual infrastructure and look at the workflow and installation of components. You'll gain insight into best practice configuration, management and security. By the end the book you'll be able to build your own VMware vSphere lab that can run even the most demanding of workloads.
Table of Contents (22 chapters)
Free Chapter
1
Section 1: Getting Started
8
Section 2: Managing Resources
13
Section 3: Advanced Topics
18
Section 4: Building Your Lab Environment

Security and hardening concepts in vSphere

Security is a complete process flow with an entire life cycle; depending on the model that will be used, the first part of the process is usually product-agnostic, but there is a part that's dependent on the different products and their features and capabilities.

Following VMware's vision, the five pillars of cyber hygiene are as follows:

  • Least privilege: This is the standard and most reasonable approach, which applies to user accounts, service accounts, and services in general (for example, used ports).
  • Micro-segmentation: Using NSX, it's finally possible to bring network control at the VM level with granular security rules. Considering also the new product, VMware AppDefense, VM security can be enforced at both network and application levels.
  • Encryption: Data must be protected at each level, and for the physical level...