Network Security
VMware Cloud
services rely on
layers of network security and build on top of the base network security provided by IaaS
providers. As a customer, for guidance on implementing a secure environment, you can access
the documentation or contact the technical support team.Network architecture diagrams that include data flows between security domains and zones
are updated regularly. Policies, procedures, and configurations protect the VMware
network environments. Wireless networks are not used to connect directly to the
production environment.
Network diagrams and data flow clearly
identify high-risk environments and systems that have legal compliance impacts. VMware
has implemented technical measures and applies defense-in-depth techniques for detection
and timely response to network-based attacks associated with anomalous ingress or egress
traffic patterns and distributed denial-of-service (DDoS) attacks.
The security controls of VMware reduce the
risk of unauthorized access to sensitive information in the production environment.
VMware Cloud
services have
several intrusion detection mechanisms to collect and monitor the environment logs
correlated with both public and private threat feeds to spot suspicious and unusual
activities. For
VMware Cloud on Dell
, VMware uses VeloCloud SD-WAN to create an encrypted
tunnel to each customer location for a management access to the SDDC. Policies are
applied to segment customer networks.