VMware VCM 5.3 - TRANSPORT LAYER SECURITY IMPLEMENTATION Guide d'installation

Naviguer en ligne ou télécharger Guide d'installation pour Logiciel VMware VCM 5.3 - TRANSPORT LAYER SECURITY IMPLEMENTATION. VMware VCM 5.3 - TRANSPORT LAYER SECURITY IMPLEMENTATION Installation guide Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 90
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 0
VMware vCenter Configuration Manager
Security Guide
vCenter Configuration Manager 5.5
This document supports the version of each product listed and supports all
subsequent versions until the document is replaced by a new edition. To
check for more recent editions of this document, see
http://www.vmware.com/support/pubs.
EN-000683-00
Vue de la page 0
1 2 3 4 5 6 ... 89 90

Résumé du contenu

Page 1 - Security Guide

VMware vCenter Configuration ManagerSecurity GuidevCenter Configuration Manager 5.5This document supports the version of each product listed and suppo

Page 2 - Copyright

nCollector service that processes requests and receives resultsnSQL Server database that stores results and application control informationnInternet I

Page 3 - Contents

Figure 1–1. VCMComponents and ZonesCAUTION Any system that participates in your VCM environment can contain sensitive data, or itcan hold authenticat

Page 4 - VCM User Interface System 39

nVCM users and administrators log in to VCM and use its Web interface to administer managedmachines using the Agents, run compliance tests, and genera

Page 5 - Authentication 57

Requirement InfrastructureZoneServerZoneUIZoneAgentZoneAccess to machine configuration settings isrestricted.X X X XRoutine backups, patches, and viru

Page 6 - Index 87

VCM Security Guide14VMware, Inc.

Page 7 - About This Book

Domain Infrastructure2Domain InfrastructureSecuring the domain infrastructure for use with VCM involves configuring the domain controller,network infr

Page 8

Microsoft Domain Controller Hardening GuidelinesTo secure the domain controller for use with VCM, start by following Microsoft domain controllerharden

Page 9

Carefully Assigning AccountsAs an enterprise-wide configuration management and compliance tool, VCM can collect, correlate, andchange system data on m

Page 10 - VMware, Inc

VCM cannot control access to data after it is exported in these ways. When data must be exported,personnel must protect the exported files while store

Page 11 - How Personnel Use VCM

VCM Installation Kits3VCM Installation KitsLike the systems on which VCM runs, the software installation kits for VCM must be secured andprotected fro

Page 12 - Trust Zones

CopyrightYou can find the most up-to-date technical documentation on the VMware Web site at:http://www.vmware.com/support/The VMware Web site also pro

Page 13 - Introduction to VCM Security

Unknown Software Publisher WarningsDo not ignore unknown software publisher warnings during ClickOnce installations unless the publisher isVMware.When

Page 14

Server Zone Security4Server Zone SecurityAddress the following security environment guidelines for all systems in the server zone, including theVCM Co

Page 15 - Domain Infrastructure

General Security Guidelines for VCM ServersIn the server zone, VCM systems store and manipulate the collected data and change requests for everymanage

Page 16 - Domain Accounts

Dedicating a Server to VCMVCM relies on the server operating system to protect the confidentiality, integrity, and availability ofserver zone data fro

Page 17 - Personnel Considerations

The Microsoft CSPs that ship with Windows 2000, 2003, XP, Vista, Windows 7, and Server 2008 meet theFIPS 140–2 standard. Do not delete, replace, or su

Page 18

VCM Collector Server5VCM Collector ServerThe following sections describe security and hardening guidelines that are unique to the VCM Collectorfunctio

Page 19 - VCM Installation Kits

VCM Security Guide26VMware, Inc.

Page 20

SQL Server6SQL ServerThe following sections describe security and hardening guidelines that are unique to the system whereMicrosoft SQL Server and you

Page 21 - Server Zone Security

nSQL Server 2005 Best Practices Analyzer ToolnSQL Server 2008 R2 Best Practices Analyzer ToolA secure installation of VCM pays particular attention to

Page 22 - Disabling Automatic Login

For secure operation of VCM, configure for delegation. With private login, the VCM Web servicemaintains a copy of the VCM user's login credential

Page 23

ContentsContentsAbout This Book 7Introduction to VCM Security 9VCM Security Environment 9VCM Components 9How Personnel Use VCM 11Trust Zones 12System

Page 24

VCM Security Guide30VMware, Inc.

Page 25 - VCM Collector Server

Web Server7Web ServerThis chapter describes security and hardening guidelines that are unique to the Web server system whereMicrosoft Internet Informa

Page 26

Use Integrated Windows Authentication (IWA) with this directory by setting the IIS metabase propertyNTAuthenticationProviders to the string 'Nego

Page 27 - SQL Server

VCM Agent Systems and ManagedMachines8VCM Agent Systems and Managed MachinesThis chapter describes security and hardening guidelines for what is possi

Page 28 - Login Accounts for SQL Server

Restricting Access to ScriptingGrant access to script authoring, remote commands, content authoring, and import and export only toVCM administrators.V

Page 29

Use physical (possession, locks) or cryptographic (encrypted file system) means to maintain continuouscontrol.Unauthorized AgentsThe managed machine a

Page 30

Trusted Certificate StoreThe Agent validates up to two certificates while authenticating and authorizing a Collector: a rootcertificate and an Enterpr

Page 31 - Web Server

Individual CollectionResultsTrust individual collectionresults to be only as valid as their source.Data collected by VCM is returned by the Agent th

Page 32 - Web Server Certificates

VCM Security Guide38VMware, Inc.

Page 33 - Machines

VCM User Interface System9VCM User Interface SystemThe VCM Web Console runs in Internet Explorer and connects to the VCM Web application served byIIS.

Page 34 - VCM Agent

VCM Security GuideUsing VCM to Manage the SQL Server 27Having a SQL Server Machine Group in VCM 27Microsoft SQL Server Best Practices and Hardening Te

Page 35 - Maintenance Mode

Access ControlThe security environment for machines in the user interface zone is less strict than in the server zone. Userinterface machines are not

Page 36 - Trustworthiness of Data

Public Access PointsDo not run the VCM user interface from public systems or from public Internet access points like kiosks orInternet cafés.Network t

Page 37 - Individual CollectionResults

To add the VCM Web server to the Internet Explorer trusted zone, see the instructions in the VCMInstallation Guide.Removing Untrusted SystemsDo not al

Page 38

NOTE Initially, Internet Explorer asks you to review the details of self-signed certificates. It treats self-signed certificates as suspicious until y

Page 39 - VCM User Interface System

VCM Security Guide44VMware, Inc.

Page 40 - Access Control

Software Provisioning Components10Software Provisioning ComponentsA software package is composed of the files and scripts necessary to install and rem

Page 41 - Cross-site Scripting

Separating and Securing the Software Provisioning ZoneMake the software provisioning zone network a private network. Use a separate, dedicated network

Page 42 - Verifying Certificates

Software Provisioning CredentialsNormally, VCM does not store customer credentials on a managed machine. During softwareprovisioning though, the Netwo

Page 43

VCM Security Guide48VMware, Inc.

Page 44

Operating System Provisioning Com-ponents11Operating System Provisioning ComponentsVCM operating system provisioning deploys operating system images t

Page 45

ContentsVMware Software Publisher Certificate 43FIPS Cryptographic Service Providers 43Running Anti-virus and Anti-rootkit Tools 43Software Provisioni

Page 46 - Connecting to Repositories

Separating and Securing the OS Provisioning ZoneMake the operating system provisioning zone network a private network. Use a separate, dedicatednetwor

Page 47

To mitigate this risk, use one or more of the following techniques:nUse operating system provisioning only across a secure network. After a machine is

Page 48

VCM Security Guide52VMware, Inc.

Page 49

Decommissioning12DecommissioningSystems where VCM was installed contain private keys, sensitive credentials, and collection results.Properly decommiss

Page 50 - OS Provisioning Credentials

Besides being difficult to copy securely, copying a private key presents the risk of sharing it with morethan one machine, a configuration that is uns

Page 51

Always trace the origin of your virtual machines backward and forward so that you find all systems thatcontain confidential data or keys.Decommissioni

Page 52

VCM Security Guide56VMware, Inc.

Page 53 - Decommissioning

Authentication13AuthenticationThis chapter describes the VCM authentication and certificate structure. To understand these concepts,you must have some

Page 54 - Erasing Virtual Machines

Using Single or Paired KeysEncryption usually uses one of the following approaches:nSingle key (symmetric) algorithms rely on a single key that both e

Page 55

Certificate Expiration and RevocationBecause keys can be compromised and circumstances can change, keys and certificates are not designedfor indefinit

Page 56

VCM Security GuideMark a Certificate as Authorized on Windows 69Creating Certificates Using Makecert 70Create the Enterprise Certificate and First Col

Page 57 - Authentication

nAn Enterprise certificatenOne or more Collectors, each with a certificatenAn Agent certificate for each managed machine, for mutual authenticationVCM

Page 58 - Trust Chains

Figure 13–2. Shared Collector-Agent RelationshipTo properly support the trust chain, mutual authentication, and multiple Collector environments,Enterp

Page 59 - How VCM Uses Certificates

Authorized Certificates in the Trust ChainAgents maintain a store of trusted certificates used for authenticating Collectors. When a Collector sendsit

Page 60

First ContactWhen a Collector first contacts an Agent, the Agent determines whether the Agent already has a certificateand private key pair. If the Ag

Page 61 - Collector Certificate

nCollector certificate. Local machine personal system storenEnterprise certificate. Local machine trusted root system storeThe private key of the Ente

Page 62 - Agent Certificates

This renewal process only works for Collector certificates stored in the Agent certificate store. In mutualauthentication in the other direction, Agen

Page 63 - Changes to Agent Certificates

Replace Only the Collector CertificateAfter VCM installation, you can replace the certificates generated or selected during installation. To replaceon

Page 64 - Changing Certificates

Installing on Windows with CMAgtInstall.exeThe CMAgtInstall.exe installer executable file does not contain certificates for Agents. Instead,CMAgtInsta

Page 65 - Replacing Certificates

Storing and Transporting CertificatesA certificate contains the public half of a key pair, identifying information, and an authenticating signature.Al

Page 66 - Installing the Agent

If you are exporting the private key, store the file to a secure folder.9. Type a name for the certificate file and click Save.10. Click Next.11. Revi

Page 67 - Installing Using Provisioning

About This BookAbout This BookThe VMware vCenter Configuration Manager Security Guide describes how to harden vCenter ConfigurationManager (VCM) for s

Page 68

PrerequisitesnOpen the certificate store. See "Access the Windows Certificate Store" on page 68.nImport the certificate into the Agent machi

Page 69

Create the Enterprise Certificate and First Collector CertificateIn this process, the Enterprise and first Collector systems are the same machine. See

Page 70

Examplemakecert -pe -n "CN=CM Collector Certificate BBBBBB" -sky exchange -sv "CMCollector BBBBBB.pvk" -b 04/07/2008 -e 04/07/2018

Page 71

NOTE VCM programmatically uses a long GUID, represented by AAAAAA or BBBBBB, to ensure that aname is unique. You do not need a long GUID in a manual p

Page 72 - Makecert Options

Option Descriptionthe VCM installer have the form:"CN=VMware VCM Collector Certificate AAAAAA, T=VMwareVCM Certificate 7529006C-222F-4EBF-A7E7-F6

Page 73 - Option Description

use <insert your VCM SB name here>update ecm_sysdat_configuration_valuesset configuration_value = upper(replace('xx xx xx xx xx xx xx xx xx

Page 74

CSI_ManageCertificateStore OptionsThe following printout of the CSI_ManageCertificateStore manpage is useful in understanding the CSI_ManageCertificat

Page 75 - Environment Variables

CSI_ManageCertificateStore -d -f filenameorCSI_ManageCertificateStore -d -g fingerprintDelete existing certificates from the certificate store:CSI_Man

Page 76

By default, the -l option for listing certificates causes all certificates in the store to be listed. This behaviorcan be modified by specifying optio

Page 77

Inserting Certificate:Fingerprint: 0041AB5ECF869E1D6A38389A6B834D5768932397Common Name: Enterprise Certificate 2CA82018-20E1-4487-8A02-DA7A2CFD4304Sub

Page 78

environment. To access information about education classes, certificationprograms, and consulting services, go to http://www.vmware.com/services.VCM S

Page 79

VCM Security Guide80VMware, Inc.

Page 80

Supplemental References14Supplemental ReferencesThis chapter provides reference information about VCM and its security implementation.CryptographyIf y

Page 81 - Supplemental References

Operating System Version HardwarePlatformFIPS Module CertificateWindows 2000 All x86 103Windows 2008 1 x86 and 64-bit;Itanium is notsupported.See &quo

Page 82

DSSENH Validated OperatingSystemsValidatedVersionsFIPS Certificate# FIPS VersionValidatedWindows 2000 SP2 5.0.2195.2228 #103 140–1Windows 2000 SP3 5.

Page 83 - Export Considerations

OpenSSL-FIPS, OpenSSL, libssh2nCommunication protocols; such as TCP, Telnet, X.25, IEEE 802.11, IEEE 802.16, or SIP:Communication takes place over TCP

Page 84 - VCM Ports

Port Transport Usage389 TCP, UDP Lightweight Directory Access Protocol (LDAP)443 TCP HTTPS (HTTP over SSL/TLS)445 TCP, UDP Server message block (SMB)

Page 85 - Port Transport Usage

VCM Security Guide86VMware, Inc.

Page 86

IndexAaccess 35UI zone machines 40accountsdomain 40granted 17agentcertificate 59, 62install 66installation 33manual installation 67one per machine 35p

Page 87

FFIPSagent proxy 83Windows hardware 81firewallSQL Server 28Foundation Checker 23HhardwareFIPS 81hostdecommission 53OS provisioning server 50security 1

Page 88

machine 23managed machines 23no direct connection 28trusted software 23, 42servicesnetwork infrastructure 16signed packages 46softwareClickOnce 20pack

Page 89

Introduction to VCM Security1Introduction to VCM SecurityTo understand VCM security requirements, familiarize yourself with the overall security envir

Page 90

90VMware, Inc.VCM Security Guide

Commentaires sur ces manuels

Pas de commentaire