Customer Data Access by VMware
As a customer, you retain control and ownership of your content and can secure your
data as required.
VMware controls the access rights based on the principle of least privilege, which means
only the minimum level of access required is granted. Access is provided according to
the individual job functions and requirements. Appropriate levels of management
authorize the access rights to computers and information systems and before the rights
are granted. Managing access to information systems is implemented and controlled
through centralized identity stores and directories.
The VMware Security Operations Center uses
log capture, security monitoring technologies, and intrusion detection tools to monitor
VMware personnel accessing customer data. Only authorized VMware operators access the
customer data. The authentication process uses a two-factor authentication process and
generates a user-specific time-based temporary credential. This temporary credential is
tied to a specific incident, and all activities performed by this user is logged. The
log information is disclosed to the customer upon request.
The third parties cannot access the
production environment or customer content. If customers have questions about a specific
individual accessing their environment, VMware investigates this activity.