Selitev na inoviranje vrha:
Preberite, kako lahko selitev in posodobitev v Azure izboljšata učinkovitost delovanja, odpornost in varnost vašega podjetja, kar vam omogoča, da v celoti sprejmete AI.Prijavite se zdaj
Ta brskalnik ni več podprt.
Izvedite nadgradnjo na Microsoft Edge, če želite izkoristiti vse prednosti najnovejših funkcij, varnostnih posodobitev in tehnične podpore.
Security recommendations for Azure VMware Solution
Članek
It's important to take proper measures to secure your Azure VMware Solution deployments. Use the information in this article as a high-level guide to achieve your security goals.
General
Use the following guidelines and links for general security recommendations for both Azure VMware Solution and VMware best practices.
The following recommendations for network-related security apply to Azure VMware Solution.
Recommendation
Comments
Only allow trusted networks.
Only allow access to your environments over Azure ExpressRoute or other secured networks. Avoid exposing your management services like vCenter Server, for example, on the internet.
Use Azure Firewall Premium.
If you must expose management services on the internet, use Azure Firewall Premium with both intrusion detection and detention system (IDPS) Alert and Deny mode along with Transport Layer Security (TLS) inspection for proactive threat detection.
Deploy and configure network security groups on a virtual network.
Ensure that any deployed virtual network has network security groups configured to control ingress and egress to your environment.
Review and implement recommendations within the Azure security baseline for Azure VMware Solution.
See the following information for recommendations to secure your VMware HCX deployment.
Recommendation
Comments
Stay current with VMware HCX service updates.
VMware HCX service updates can include new features, software fixes, and security patches. To apply service updates during a maintenance window where no new VMware HCX operations are queued up, follow these steps.
Demonstrate the skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities.