Security Best Practices for Securing VMware NSX
You must follow multiple best practices at all times when you operate your NSX environment.
Best Practice and Configuration ID | Description |
---|---|
Use roles and privileges in NSX Manager to limit user privileges. VMW-NSX-01410 | Users and service accounts must be assigned the required privileges only. You can create a new role with reduced permissions. Navigate to . Click Add role , provide a name, the required permissions, and click Save .You can reduce permissions to an existing role. Navigate to . Click the vertical ellipsis next to the target user or group, select Edit , remove the existing role, select the new role, and click Save . |
Integrate VMware Identity Manager (vIDM) or OpenID Connect (which supports multi factor authenticaiton) with NSX VMW-NSX-01415 | Use vIDM or OpenID Connect to meet requirements for authentication, authorization, and access control. |
NSX Manager must obtain its public key certificates from an approved certificate authority. VMW-NSX-01466 | For user certificates, each organization obtains certificates from an approved, shared service provider, as required by OMB policy. For federal agencies operating a legacy public key infrastructure cross-certified with the Federal Bridge Certification Authority at medium assurance or higher, this Certification Authority will suffice. |