VMware VCM 5.3 - TRANSPORT LAYER SECURITY IMPLEMENTATION Installationsanleitung

Stöbern Sie online oder laden Sie Installationsanleitung nach Software VMware VCM 5.3 - TRANSPORT LAYER SECURITY IMPLEMENTATION herunter. VMware VCM 5.3 - TRANSPORT LAYER SECURITY IMPLEMENTATION Installation guide Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 90
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 0
VMware vCenter Configuration Manager
Security Guide
vCenter Configuration Manager 5.5
This document supports the version of each product listed and supports all
subsequent versions until the document is replaced by a new edition. To
check for more recent editions of this document, see
http://www.vmware.com/support/pubs.
EN-000683-00
Seitenansicht 0
1 2 3 4 5 6 ... 89 90

Inhaltsverzeichnis

Seite 1 - Security Guide

VMware vCenter Configuration ManagerSecurity GuidevCenter Configuration Manager 5.5This document supports the version of each product listed and suppo

Seite 2 - Copyright

nCollector service that processes requests and receives resultsnSQL Server database that stores results and application control informationnInternet I

Seite 3 - Contents

Figure 1–1. VCMComponents and ZonesCAUTION Any system that participates in your VCM environment can contain sensitive data, or itcan hold authenticat

Seite 4 - VCM User Interface System 39

nVCM users and administrators log in to VCM and use its Web interface to administer managedmachines using the Agents, run compliance tests, and genera

Seite 5 - Authentication 57

Requirement InfrastructureZoneServerZoneUIZoneAgentZoneAccess to machine configuration settings isrestricted.X X X XRoutine backups, patches, and viru

Seite 6 - Index 87

VCM Security Guide14VMware, Inc.

Seite 7 - About This Book

Domain Infrastructure2Domain InfrastructureSecuring the domain infrastructure for use with VCM involves configuring the domain controller,network infr

Seite 8

Microsoft Domain Controller Hardening GuidelinesTo secure the domain controller for use with VCM, start by following Microsoft domain controllerharden

Seite 9

Carefully Assigning AccountsAs an enterprise-wide configuration management and compliance tool, VCM can collect, correlate, andchange system data on m

Seite 10 - VMware, Inc

VCM cannot control access to data after it is exported in these ways. When data must be exported,personnel must protect the exported files while store

Seite 11 - How Personnel Use VCM

VCM Installation Kits3VCM Installation KitsLike the systems on which VCM runs, the software installation kits for VCM must be secured andprotected fro

Seite 12 - Trust Zones

CopyrightYou can find the most up-to-date technical documentation on the VMware Web site at:http://www.vmware.com/support/The VMware Web site also pro

Seite 13 - Introduction to VCM Security

Unknown Software Publisher WarningsDo not ignore unknown software publisher warnings during ClickOnce installations unless the publisher isVMware.When

Seite 14

Server Zone Security4Server Zone SecurityAddress the following security environment guidelines for all systems in the server zone, including theVCM Co

Seite 15 - Domain Infrastructure

General Security Guidelines for VCM ServersIn the server zone, VCM systems store and manipulate the collected data and change requests for everymanage

Seite 16 - Domain Accounts

Dedicating a Server to VCMVCM relies on the server operating system to protect the confidentiality, integrity, and availability ofserver zone data fro

Seite 17 - Personnel Considerations

The Microsoft CSPs that ship with Windows 2000, 2003, XP, Vista, Windows 7, and Server 2008 meet theFIPS 140–2 standard. Do not delete, replace, or su

Seite 18

VCM Collector Server5VCM Collector ServerThe following sections describe security and hardening guidelines that are unique to the VCM Collectorfunctio

Seite 19 - VCM Installation Kits

VCM Security Guide26VMware, Inc.

Seite 20

SQL Server6SQL ServerThe following sections describe security and hardening guidelines that are unique to the system whereMicrosoft SQL Server and you

Seite 21 - Server Zone Security

nSQL Server 2005 Best Practices Analyzer ToolnSQL Server 2008 R2 Best Practices Analyzer ToolA secure installation of VCM pays particular attention to

Seite 22 - Disabling Automatic Login

For secure operation of VCM, configure for delegation. With private login, the VCM Web servicemaintains a copy of the VCM user's login credential

Seite 23

ContentsContentsAbout This Book 7Introduction to VCM Security 9VCM Security Environment 9VCM Components 9How Personnel Use VCM 11Trust Zones 12System

Seite 24

VCM Security Guide30VMware, Inc.

Seite 25 - VCM Collector Server

Web Server7Web ServerThis chapter describes security and hardening guidelines that are unique to the Web server system whereMicrosoft Internet Informa

Seite 26

Use Integrated Windows Authentication (IWA) with this directory by setting the IIS metabase propertyNTAuthenticationProviders to the string 'Nego

Seite 27 - SQL Server

VCM Agent Systems and ManagedMachines8VCM Agent Systems and Managed MachinesThis chapter describes security and hardening guidelines for what is possi

Seite 28 - Login Accounts for SQL Server

Restricting Access to ScriptingGrant access to script authoring, remote commands, content authoring, and import and export only toVCM administrators.V

Seite 29

Use physical (possession, locks) or cryptographic (encrypted file system) means to maintain continuouscontrol.Unauthorized AgentsThe managed machine a

Seite 30

Trusted Certificate StoreThe Agent validates up to two certificates while authenticating and authorizing a Collector: a rootcertificate and an Enterpr

Seite 31 - Web Server

Individual CollectionResultsTrust individual collectionresults to be only as valid as their source.Data collected by VCM is returned by the Agent th

Seite 32 - Web Server Certificates

VCM Security Guide38VMware, Inc.

Seite 33 - Machines

VCM User Interface System9VCM User Interface SystemThe VCM Web Console runs in Internet Explorer and connects to the VCM Web application served byIIS.

Seite 34 - VCM Agent

VCM Security GuideUsing VCM to Manage the SQL Server 27Having a SQL Server Machine Group in VCM 27Microsoft SQL Server Best Practices and Hardening Te

Seite 35 - Maintenance Mode

Access ControlThe security environment for machines in the user interface zone is less strict than in the server zone. Userinterface machines are not

Seite 36 - Trustworthiness of Data

Public Access PointsDo not run the VCM user interface from public systems or from public Internet access points like kiosks orInternet cafés.Network t

Seite 37 - Individual CollectionResults

To add the VCM Web server to the Internet Explorer trusted zone, see the instructions in the VCMInstallation Guide.Removing Untrusted SystemsDo not al

Seite 38

NOTE Initially, Internet Explorer asks you to review the details of self-signed certificates. It treats self-signed certificates as suspicious until y

Seite 39 - VCM User Interface System

VCM Security Guide44VMware, Inc.

Seite 40 - Access Control

Software Provisioning Components10Software Provisioning ComponentsA software package is composed of the files and scripts necessary to install and rem

Seite 41 - Cross-site Scripting

Separating and Securing the Software Provisioning ZoneMake the software provisioning zone network a private network. Use a separate, dedicated network

Seite 42 - Verifying Certificates

Software Provisioning CredentialsNormally, VCM does not store customer credentials on a managed machine. During softwareprovisioning though, the Netwo

Seite 43

VCM Security Guide48VMware, Inc.

Seite 44

Operating System Provisioning Com-ponents11Operating System Provisioning ComponentsVCM operating system provisioning deploys operating system images t

Seite 45

ContentsVMware Software Publisher Certificate 43FIPS Cryptographic Service Providers 43Running Anti-virus and Anti-rootkit Tools 43Software Provisioni

Seite 46 - Connecting to Repositories

Separating and Securing the OS Provisioning ZoneMake the operating system provisioning zone network a private network. Use a separate, dedicatednetwor

Seite 47

To mitigate this risk, use one or more of the following techniques:nUse operating system provisioning only across a secure network. After a machine is

Seite 48

VCM Security Guide52VMware, Inc.

Seite 49

Decommissioning12DecommissioningSystems where VCM was installed contain private keys, sensitive credentials, and collection results.Properly decommiss

Seite 50 - OS Provisioning Credentials

Besides being difficult to copy securely, copying a private key presents the risk of sharing it with morethan one machine, a configuration that is uns

Seite 51

Always trace the origin of your virtual machines backward and forward so that you find all systems thatcontain confidential data or keys.Decommissioni

Seite 52

VCM Security Guide56VMware, Inc.

Seite 53 - Decommissioning

Authentication13AuthenticationThis chapter describes the VCM authentication and certificate structure. To understand these concepts,you must have some

Seite 54 - Erasing Virtual Machines

Using Single or Paired KeysEncryption usually uses one of the following approaches:nSingle key (symmetric) algorithms rely on a single key that both e

Seite 55

Certificate Expiration and RevocationBecause keys can be compromised and circumstances can change, keys and certificates are not designedfor indefinit

Seite 56

VCM Security GuideMark a Certificate as Authorized on Windows 69Creating Certificates Using Makecert 70Create the Enterprise Certificate and First Col

Seite 57 - Authentication

nAn Enterprise certificatenOne or more Collectors, each with a certificatenAn Agent certificate for each managed machine, for mutual authenticationVCM

Seite 58 - Trust Chains

Figure 13–2. Shared Collector-Agent RelationshipTo properly support the trust chain, mutual authentication, and multiple Collector environments,Enterp

Seite 59 - How VCM Uses Certificates

Authorized Certificates in the Trust ChainAgents maintain a store of trusted certificates used for authenticating Collectors. When a Collector sendsit

Seite 60

First ContactWhen a Collector first contacts an Agent, the Agent determines whether the Agent already has a certificateand private key pair. If the Ag

Seite 61 - Collector Certificate

nCollector certificate. Local machine personal system storenEnterprise certificate. Local machine trusted root system storeThe private key of the Ente

Seite 62 - Agent Certificates

This renewal process only works for Collector certificates stored in the Agent certificate store. In mutualauthentication in the other direction, Agen

Seite 63 - Changes to Agent Certificates

Replace Only the Collector CertificateAfter VCM installation, you can replace the certificates generated or selected during installation. To replaceon

Seite 64 - Changing Certificates

Installing on Windows with CMAgtInstall.exeThe CMAgtInstall.exe installer executable file does not contain certificates for Agents. Instead,CMAgtInsta

Seite 65 - Replacing Certificates

Storing and Transporting CertificatesA certificate contains the public half of a key pair, identifying information, and an authenticating signature.Al

Seite 66 - Installing the Agent

If you are exporting the private key, store the file to a secure folder.9. Type a name for the certificate file and click Save.10. Click Next.11. Revi

Seite 67 - Installing Using Provisioning

About This BookAbout This BookThe VMware vCenter Configuration Manager Security Guide describes how to harden vCenter ConfigurationManager (VCM) for s

Seite 68

PrerequisitesnOpen the certificate store. See "Access the Windows Certificate Store" on page 68.nImport the certificate into the Agent machi

Seite 69

Create the Enterprise Certificate and First Collector CertificateIn this process, the Enterprise and first Collector systems are the same machine. See

Seite 70

Examplemakecert -pe -n "CN=CM Collector Certificate BBBBBB" -sky exchange -sv "CMCollector BBBBBB.pvk" -b 04/07/2008 -e 04/07/2018

Seite 71

NOTE VCM programmatically uses a long GUID, represented by AAAAAA or BBBBBB, to ensure that aname is unique. You do not need a long GUID in a manual p

Seite 72 - Makecert Options

Option Descriptionthe VCM installer have the form:"CN=VMware VCM Collector Certificate AAAAAA, T=VMwareVCM Certificate 7529006C-222F-4EBF-A7E7-F6

Seite 73 - Option Description

use <insert your VCM SB name here>update ecm_sysdat_configuration_valuesset configuration_value = upper(replace('xx xx xx xx xx xx xx xx xx

Seite 74

CSI_ManageCertificateStore OptionsThe following printout of the CSI_ManageCertificateStore manpage is useful in understanding the CSI_ManageCertificat

Seite 75 - Environment Variables

CSI_ManageCertificateStore -d -f filenameorCSI_ManageCertificateStore -d -g fingerprintDelete existing certificates from the certificate store:CSI_Man

Seite 76

By default, the -l option for listing certificates causes all certificates in the store to be listed. This behaviorcan be modified by specifying optio

Seite 77

Inserting Certificate:Fingerprint: 0041AB5ECF869E1D6A38389A6B834D5768932397Common Name: Enterprise Certificate 2CA82018-20E1-4487-8A02-DA7A2CFD4304Sub

Seite 78

environment. To access information about education classes, certificationprograms, and consulting services, go to http://www.vmware.com/services.VCM S

Seite 79

VCM Security Guide80VMware, Inc.

Seite 80

Supplemental References14Supplemental ReferencesThis chapter provides reference information about VCM and its security implementation.CryptographyIf y

Seite 81 - Supplemental References

Operating System Version HardwarePlatformFIPS Module CertificateWindows 2000 All x86 103Windows 2008 1 x86 and 64-bit;Itanium is notsupported.See &quo

Seite 82

DSSENH Validated OperatingSystemsValidatedVersionsFIPS Certificate# FIPS VersionValidatedWindows 2000 SP2 5.0.2195.2228 #103 140–1Windows 2000 SP3 5.

Seite 83 - Export Considerations

OpenSSL-FIPS, OpenSSL, libssh2nCommunication protocols; such as TCP, Telnet, X.25, IEEE 802.11, IEEE 802.16, or SIP:Communication takes place over TCP

Seite 84 - VCM Ports

Port Transport Usage389 TCP, UDP Lightweight Directory Access Protocol (LDAP)443 TCP HTTPS (HTTP over SSL/TLS)445 TCP, UDP Server message block (SMB)

Seite 85 - Port Transport Usage

VCM Security Guide86VMware, Inc.

Seite 86

IndexAaccess 35UI zone machines 40accountsdomain 40granted 17agentcertificate 59, 62install 66installation 33manual installation 67one per machine 35p

Seite 87

FFIPSagent proxy 83Windows hardware 81firewallSQL Server 28Foundation Checker 23HhardwareFIPS 81hostdecommission 53OS provisioning server 50security 1

Seite 88

machine 23managed machines 23no direct connection 28trusted software 23, 42servicesnetwork infrastructure 16signed packages 46softwareClickOnce 20pack

Seite 89

Introduction to VCM Security1Introduction to VCM SecurityTo understand VCM security requirements, familiarize yourself with the overall security envir

Seite 90

90VMware, Inc.VCM Security Guide

Kommentare zu diesen Handbüchern

Keine Kommentare