TechHead

Cloud, Containers, Virtualization & Artificial Intelligence (AI) blog also covering Linux, Windows & Tech how-to

  • Home
  • Blog Categories
    • VMware
      • VMware “How To” Posts
      • VMware Troubleshooting
      • VMware Workstation & Fusion
      • VMware Backup & Replication
      • VMware vCloud Director
      • VMware Certification
      • VMware Horizon
      • VMware PowerCLI
      • VMware Security
      • VMware Training
      • VMware User Group & Community
      • VMware View
      • VMworld
      • VMware Useful Links
    • EMC
      • Virtual Storage Appliance (VSA)
      • vSphere VSI Plugin
    • HP
      • Proliant Servers
    • Microsoft
      • MS Windows Server
      • MS Hyper-V
      • MS Exchange
      • MS SQL Server
      • MS PowerShell
    • General Tech
    • Cloud
    • Networking
    • Iomega
    • Apple
    • Cisco
    • Linux
    • Internet & Web
    • WordPress
  • About Me
  • Home Labs
You are here: Home / VMware / Security / VMware vSphere 5.5 Hardening Guide Now Available

VMware vSphere 5.5 Hardening Guide Now Available

by 1 Comment

vSphere 5.5 Hardening Guide DownloadThe VMware vSphere 5.5 Hardening Guide is now available for download.  If you’re thinking about, or have already, updated your VMware vSphere infrastructure to v5.5 then I recommend you take a look and familiarise yourself with this informative security hardening guide.  It is full of useful vulnerability avoidance know-how and contains best practices around the following vSphere products:

– Virtual Machines
– ESXi hosts
– Virtual Network
– vCenter Server plus its database and clients.
– Common vCenter and Windows specific guidance is here.
– vCenter Web Client
– vCenter SSO Server- vCenter Virtual Appliance (VCSA) specific guidance
– vCenter Update Manager

SNAGHTML2805ab

Risk Profiles

Each best practice entry is rated with one or more of the following three ‘profiles’ so you know which hardening best practices should be implemented for your particular VMware infrastructure to best meet requirements:

Risk Profile 3: guidelines that should be implemented in all environments

Risk Profile 2: guidelines that should be implemented for more sensitive environments, e.g. those handling more sensitive data, those subject to stricter compliance rules, etc.

Risk Profile 1: guidelines that only be implemented in the highest security environments, e.g. top-secret government or military, extremely sensitive data, etc.

If you’re not 100% comfortable in rolling out one or more of any of the security hardening recommendations in the guide then definitely look at familiarising yourself with it in your work or home vSphere lab first – one of the many justifications for running my own home vSphere lab.  Winking smile

Download the VMware vSphere 5.5 Hardening Guide:

Click here to download the VMware vSphere 5.5 Hardening Guide.

Thanks to Mike Foley in his blog post, which can be found here, who informed me about this latest release.

Filed Under: Security, VMware Tagged With: hardening guide, Security, VMware, vSphere, vSphere 5.5

About

Simon is a Boston, USA, based Virtualization, Cloud & IT Technology Evangelist. He loves working in the ever-changing IT industry & spends most of his time working with Virtualization, Cloud & other Enterprise IT-based technologies.

As well as on this site, you can find him on Twitter

Trackbacks

  1. VMware vSphere 5.5 U1 Hardening Guide Available says:
    12 June 2014 at 10:43 am

    […] hardening guide which covers vSphere 5.5 Update 1 (U1).  This is the latest update since the vSphere 5.5 version of the Hardening guide and contains all the usual great stuff pertaining to securing your vSphere environment, but also […]

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Looking For Something?

About Me

My name is Simon Seagrave and I am a Massachusetts (ex NZ & UK) based product marketing manager. I love my work & spend most of my time working with Cloud-based technologies, including AI, containers and virtualization along with other Enterprise IT based technologies.

Awards

vExpert Badge

Recent Post Comments

  • Simon Seagrave on Exciting New Change!
  • Alfredo on Exciting New Change!
  • Olaitan Ebenezer Tosin on [Link] Dell EMC Interactive Demos
  • sathish on Changing Hosts File – Unable to set new owner on hosts. Access is denied.
  • Chili on Linksys (Cisco) SLM2008 Switch – Updating Firmware from v1.0.1 to 2.0.0.10

Recent Posts

  • The 10 Most Important AI Trends for 2024
  • Tesla factory tour – help me get on one
  • Understanding Large Language Models for AI 
  • What is Generative AI?
  • What’s the difference – Platform Engineers and DevOps Engineers?

EZ Fat Footer #1

This is Dynamik Widget Area. You can add content to this area by going to Appearance > Widgets in your WordPress Dashboard and adding new widgets to this area.

EZ Fat Footer #2

This is Dynamik Widget Area. You can add content to this area by going to Appearance > Widgets in your WordPress Dashboard and adding new widgets to this area.

Copyright © 2023 · Dynamik-Gen on Genesis Framework · WordPress · Log in