Information security and access control details the design decisions for both users/groups and integrations authentication and access controls, as well as password and certificate management.
Identity Management Design for Cloud-Based Automation for VMware Cloud Foundation
As an organization owner, you add users to your organization and provide access to the for cloud-based automation services.
As the cloud administrator for cloud-based automation services, you establish an integration with your organization's identity provider which allows you to use your organization directory services for cloud-based automation authentication. After the integration, you can control authorization to your organization, services, and projects by assigning organization and service roles to users. The Organization owner role allows you to add users to your organization and provide access to the cloud-based automation services.
As an Organization owner, you can add and change the role assignment for users. In this solution, you assign organization, service, and project roles to users.
For more information about organization roles and their permissions, see the VMware Aria Automation documentation.
- Service Roles Design for VMware Aria Automation Assembler for Cloud-Based Automation for VMware Cloud Foundation
- Service Role Design for VMware Aria Automation Service Broker for Cloud-Based Automation for VMware Cloud Foundation
- Service Role Design for VMware Aria Automation Orchestrator in VMware Aria Automation for Cloud-Based Automation for VMware Cloud Foundation
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
CBA-IAM-SEC-001 |
Limit the use of local accounts for interactive or API access and solution integration. |
Local accounts are not specific to user identity and do not offer complete auditing from an endpoint back to the user identity. |
You must define and manage service accounts, security groups, group membership, and security controls in Active Directory. |
CBA-IAM-SEC-002 |
Limit the scope and privileges for accounts used for interactive or API access and solution integration. |
The principle of least privilege is a critical aspect of access management and must be part of a comprehensive defense-in-depth security strategy. |
You must define and manage custom roles and security controls to limit the scope and privileges used for interactive access or solution integration. |
CBA-IAM-SEC-003 |
Assign Cloud-Based Automation organization, service, and project roles to designated Active Directory users. |
To provide access to Cloud-Based Automation services, you assign Active Directory users to organization and service roles. |
None. |
Service Accounts Design for VMware Aria Automation for Cloud-Based Automation for VMware Cloud Foundation
You add and configure accounts associated with other solutions to activate cloud accounts for vCenter Server instances and NSX Manager clusters across VMware Cloud Foundation instances. You configure the service accounts to provide and control integration between VMware Aria Automation Orchestrator-to-vCenter Server endpoint instances.
Accounts are assigned roles for integration between VMware Aria Automation Assembler and the VI workload domain vCenter Server instances and VI workload domain NSX Manager clusters across the VMware Cloud Foundation instances.
For an environment with NSX Federation, you configure NSX-T Manager cloud accounts for the VI workload domain NSX Local Manager instances.
This solution ensures that the context of each integration uses the least privilege and permissions scope required for the private cloud integrations.
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
CBA-CA-SEC-001 |
Define a custom vCenter Server role for VMware Aria Automation Assembler that has minimum privileges required to support a vCenter Server cloud account. |
VMware Aria Automation Assembler integrates with VI workload domain vCenter Server instances using a minimum set of privileges required to support the cloud account. |
|
CBA-CA-SEC-002 |
Create and assign the custom vCenter Server role to an Active Directory user account as a service account for each VI workload domain vCenter Server instance for application-to-application communication between VMware Aria Automation Assembler and vCenter Server. |
Provides the following access control features:
|
You must maintain the life cycle, availability, and security controls for the account in Active Directory. |
CBA-CA-SEC-003 |
Create and assign the NSXEnterprise admin role to an Active Directory user account as a service account for each VI workload domain NSX Manager instance for application-to-application communication between VMware Aria Automation Assembler and NSX. |
Provides the following access control features:
|
You must maintain the life cycle, availability, and security controls for the account in Active Directory. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
CBA-VRO-SEC-001 |
Define a custom vCenter Server role for VMware Aria Automation Orchestrator that has minimum privileges required to support adding VI workload domain vCenter Server instances. |
VMware Aria Automation Orchestrator integrates with VI workload domain vCenter Server instances by using the minimum set of privileges required to support the vCenter Server registration. |
|
CBA-VRO-SEC-002 |
Create and assign the custom vCenter Server role to an Active Directory user account as a service account for each VI workload domain vCenter Server instance for application-to-application communication between VMware Aria Automation Orchestrator and vCenter Server. |
Provides the following access control features:
|
You must maintain the life cycle, availability, and security controls for the account in Active Directory. |
Password Management Design for Cloud-Based Automation for VMware Cloud Foundation
Password management design details the design decisions covering password policy configuration and password management of the Cloud Proxy and Cloud Extensibility Proxy appliances.
Password Policies for the Cloud Proxy and Cloud Extensibility Proxy Appliances
Within the Cloud Proxy and Cloud Extensibility Proxy appliances, you can enforce password polices for access by using the virtual appliance console and SSH. You can configure these password policies by using the pluggable authentication module (PAM) that is part of the operating system of the virtual appliance. The password policies apply only to local user accounts.
Password Expiration Policy for the Cloud Proxy and Cloud Extensibility Proxy Appliances
You manage the password expiration policy on a user basis. You can modify the configuration for a user to refine the settings and adhere to the policies and regulatory standards of your organization. The default configuration is shown in the following table.
Setting |
Default |
Description |
---|---|---|
|
90 |
Maximum number of days between password change |
|
0 |
Minimum number of days between password change |
|
7 |
Number of days of warning before password expires |
Password Complexity Policy for the Cloud Proxy and Cloud Extensibility Proxy Appliances
You manage the password complexity policy by using the /etc/pam.d/system-password file. You can edit and modify the configuration to refine the settings and adhere to the policies of your organization and regulatory standards. The default configuration is shown in the following table.
Setting |
Default |
Description |
---|---|---|
|
-1 |
Maximum number of digits that generate a credit |
|
-1 |
Maximum number of uppercase characters that generate a credit |
|
-1 |
Maximum number of lowercase characters that generate a credit |
|
-1 |
Maximum number of other characters that generate a credit |
|
8 |
Minimum password length |
|
4 |
Minimum number of character types that must be used (for example, uppercase, lowercase, digits, and so on) |
|
4 |
Minimum number of characters that must be different from the old password |
|
3 |
Maximum number of reties |
|
0 |
Maximum number of times a single character can be repeated |
|
3 |
Maximum number of passwords the system remembers |
Account Lockout Policy for the Cloud Proxy and Cloud Extensibility Proxy Appliances
You manage the account lockout policy by using the /etc/pam.d/system-auth file. You can edit and modify the configuration to refine the settings and adhere to the policies of your organization and regulatory standards. The default configuration is shown in the following table.
Setting |
Default |
Description |
---|---|---|
|
3 |
Maximum number of authentication failures before the account is locked |
|
600 |
Amount of time in seconds that the account remains locked |
|
600 |
Amount of time in seconds that the root account remains locked |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
CBA-CDP-SEC-001 |
Configure the local user password expiration policy for each Cloud Proxy instance. |
|
You must manage the local user password expiration settings on each Cloud Proxy instance by using the appliance console. |
CBA-CDP-SEC-002 |
Configure the local user password complexity policy for each Cloud Proxy instance. |
|
You must manage the local user password complexity settings on each Cloud Proxy instance by using the appliance console. |
CBA-CDP-SEC-003 |
Configure the local user account lockout policy for each Cloud Proxy instance. |
|
You must manage the local user account lockout settings on each Cloud Proxy instance by using the appliance console. |
CBA-CEP-SEC-001 |
Configure the local user password expiration policy for each Cloud Extensibility Proxy instance. |
|
You must manage the local user password expiration settings on each Cloud Extensibility Proxy instance by using the appliance console. |
CBA-CEP-SEC-002 |
Configure the local user password complexity policy for each Cloud Extensibility Proxy instance. |
|
You must manage the local user password complexity settings on each Cloud Extensibility Proxy instance by using the appliance console. |
CBA-CEP-SEC-003 |
Configure the local user account lockout policy for each Cloud Extensibility Proxy instance. |
|
You must manage the local user account lockout settings on each Cloud Extensibility Proxy instance by using the appliance console. |
Password Management for the Cloud Proxy and Cloud Extensibility Proxy Appliances
Changing the passwords periodically or when certain events occur, such as an administrator leaving your organization, increases the security posture and health of the system. To ensure continued access, you must manage the life cycle of the root account password for the Cloud Proxy and Cloud Extensibility Proxy appliances.
If a password expires, you must reset the password in the component. After you reset the password, you must remediate the password across components as required.
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
CBA-CDP-SEC-004 |
Change the Cloud Proxy root password on a recurring or event-initiated schedule. |
By default, the password for the Cloud Proxy root account expires every 90 days. |
None. |
CBA-CEP-SEC-004 |
Change the Cloud Extensibility Proxy root password on a recurring or event-initiated schedule. |
By default, the password for the Cloud Extensibility Proxy root account expires every 365 days. |
None. |
Certificate Management Design for VMware Aria Automation for Cloud-Based Automation for VMware Cloud Foundation
VMware Aria Automation Orchestrator user interface and API endpoint use HTTPS connections.
VMware Aria Automation Orchestrator Certificates
The VMware Aria Automation Orchestrator user interface and API endpoint use a secure connection to communicate with VI workload domain vCenter Server instances, database systems, LDAP, and other servers. You can import an SSL certificate from a URL or PEM file to replace the SSL certificate of the VMware Aria Automation Orchestrator instance.
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
CBA-CEP-SEC-002 |
Use a certificate authority signed certificate containing the FQDN of the Cloud Extensibility appliance. |
Ensures that all communications between the components and to the externally facing browser-based UI and API are encrypted. |
|
CBA-CEP-SEC-003 |
Use a SHA-2 or higher algorithm for certificate signing. |
The SHA-1 algorithm is considered less secure and has been deprecated. |
Not all certificate authorities support SHA-2 or higher. |