VMware VCM 5.3 - CONFIGURATION MANAGER SECURITY ENVIRONMENT REQUIREMENTS Bedienungsanleitung Seite 15

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 32
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 14
vCenter Configuration Manager Security Environment Requirements
TECHNICAL WHITE PAPER / 15
6.0 Host Preparation and Management
VCM relies on certain host services for correct operation. This section documents the services that impact VCM's
ability to operate securely, and to preserve the confidentiality, integrity, and availability of data. Hosts in different
zones have different requirements, as summarized in the following table:
Requirement/Zone Infrastructure Server UI Agent
Cryptographic service providers are
FIPS-140 certified
X
SQL best practices are followed
(including use of firewall)
X
Only trusted software should be
installed in the server zone
X X X
Perform routine backups, patches,
and virus scanning
X X X X
Host Zones and Requirements
6.1 VCM hosts pass Foundation Checker checks
Before installing VCM, the VCM Foundation Checker should be run to ensure the host configuration is compatible with
VCM. Do not install VCM on platforms failing the foundation checking.
6.2 Cryptographic service providers are FIPS-140 certified
All cryptographic service providers (CSPs) installed on machines in the server zone should be FIPS 140-certified. The
use of FIPS cryptography is required by most government and financial organizations, and is part of the VCM
Common Criteria Security Target. The Microsoft CSPs shipped with Windows 2000, 2003, XP, Vista, Windows 7, and
2008 Server meet FIPS 140-2. The assumption is that these packages have not been deleted, replaced or
supplemented with non-FIPS cryptography. Since all server zone hosts are Microsoft Windows-based, you can view
the list of installed crypto providers by using 'certutil -csplist'. To verify that a module is FIPS 140-certified, check the
list at the National Institute of Standards and Technology Computer Security Resource Center.
5
Seitenansicht 14
1 2 ... 10 11 12 13 14 15 16 17 18 19 20 ... 31 32

Kommentare zu diesen Handbüchern

Keine Kommentare