Role-Based Access Control (RBAC) components
Configured
Proper RBAC groups, roles and rights are configured for administrators and consumers.
Non-user workload shared resources are secured
Yes
At least two separate physical network subnets are configured, connected through a network firewall (or at least a router with ACLs). One subnet is for a load balanced network, and the other subnet, a private management network.
IP storage (NFS) network has its own subnet
IPS and Patch management, vulnerability management, and anti-virus systems are used.
User workload shared resources are secured
Yes
Currently no IDS/IPS, SIEM, configuration, patch management, vulnerability management, anti-virus, or GRC management systems are used.
Leases, quotas, and limits may be assigned to every organization depending on the tier that is being chosen, so they have just enough resources to work on in their environments, and don’t take up excess resources.
Every organization is isolated, so they can define separate policies, and separate resource pools and allocation models, if needed.
Logging is configured
Yes
All the audit logs are configured with a VMware vRealize Log Insight™ server. All the logs are backed up and kept for an agreed upon period of time.
Standard Linux hardening guidelines
Applied
AIS RHEL security checklist measures are applied to the vCloud Director cells.