Chapter 12
Hardening the vSphere Environment
In this chapter, you will learn to:
- Use the Hardening Guide
- Work with the Guidelines
- Virtual Machines
- ESX(i) Hosts
- vNetwork
- vCenter Server
- COS
- Bring It All Together
Hardening a system involves closing the potential security holes. Examples of security holes include unnecessary software and user accounts, unused services, unused network ports, and the mixing of management traffic with client traffic over a port group. Hardening a system improves the security of that system by diminishing the number of potential vectors of attack. Nowadays you can’t risk running a nonsecure system, unless you run a completely isolated system or you simply don’t care if the system becomes compromised. And don’t ...