The appendix aggregates all design decisions of the Identity and Access Management for VMware Cloud Foundation validated solution. You can use this design decision list for reference related to the end state of the environment and potentially to track your level of adherence to the design and any justification for deviations.
Information Security and Access Design
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
IAM-VCF-SEC-001 |
Limit the use of local accounts for both interactive or API access and solution integration. |
Local accounts are not specific to user identity and do not offer complete auditing from an endpoint back to the user identity. |
You must define and manage service accounts, security groups, group membership, and security controls in Active Directory. |
IAM-VCF-SEC-002 |
Limit the scope and privileges for accounts used for both interactive or API access and solution integration. |
The principle of least privilege is a critical aspect of access management and must be part of a comprehensive defense-in-depth security strategy. |
You must define and manage custom roles and security controls to limit the scope and privileges used for interactive access or solution integration. |
IAM-VCF-SEC-003 |
Assign Active Directory user accounts to security groups following your organization's access policies. |
Allows Active Directory security groups to be assigned to roles in SDDC components for streamlined management of access and administrative privileges. |
You must define and manage security groups, group membership, and security controls in Active Directory. |
IAM-VCF-SEC-004 |
Assign Active Directory security groups to default or custom roles, as applicable, for interactive or API access to solution components based on your organization's business and security requirements.
|
|
|
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
IAM-ESXI-SEC-001 |
Configure the password expiration policy for each ESXi host. |
|
You must manage the local user password expiration policy on each ESXi host by using the advanced system settings in the vSphere Client or the Host Client. |
IAM-ESXI-SEC-002 |
Configure the password complexity policy for each ESXi host. |
|
You must manage the local user password complexity policy on each ESXi host by using the advanced system settings in the vSphere Client or the Host Client. |
IAM-ESXI-SEC-003 |
Configure the account lockout policy for each ESXi host. |
|
You must manage the local user account lockout policy on each ESXi host by using the advanced system settings in the vSphere Client or the Host Client. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
IAM-ESXI-SEC-004 |
Change the root user password for each ESXi host on a recurring or event-initiated schedule by using SDDC Manager. |
|
|
IAM-ESXI-SEC-005 |
Rotate the SERVICE account password for each ESXi host on a recurring or event-initiated schedule by using SDDC Manager. |
|
|
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
IAM-VCS-SEC-001 |
Configure the vCenter Server instances to use Active Directory over LDAP with SSL (LDAPS) as the identity source. |
|
|
IAM-VCS-SEC-002 |
Use an Active Directory user account with minimum read-only access as Base DN for users and groups to server as the service account for the Active Directory bind. |
Provides the following access control features:
|
You must manage the password life cycle of this Active Directory use account. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
IAM-VCS-SEC-003 |
Assign the default Administrator role in vCenter Server to an Active Directory security group. |
By assigning the Administrator role to an Active Directory security group, you can simplify and manage user access with administrative rights in vCenter Server based on your organization's personas. |
|
IAM-VCS-SEC-004 |
Assign vCenter Server global permissions for the Active Directory security groups assigned the Administrator role. |
By assigning the global permissions to an Active Directory security group with the Administrator role , you can manage user access with administrative rights across all management and workload domain vCenter Servers instances which participate in enhanced linked-mode and use the same identity provider. |
None. |
IAM-VCS-SEC-005 |
Assign the default Read-Only role in vCenter Server to an Active Directory security group. |
By assigning the Read-only role to an Active Directory security group, you can simplify and manage user access with read-only rights in vCenter Server based on your organization's personas. |
|
IAM-VCS-SEC-006 |
Assign vCenter Server global permissions for the Active Directory security groups assigned the Read-Only role. |
By assigning global permissions to an Active Directory security group with the Read-only role, you can manage user access with read-only privileges across all management and workload domain vCenter Servers instances which participate in enhanced linked-mode and use the same identity provider. |
None. |
IAM-VCS-SEC-007 |
Add an Active Directory security group as a member of the vCenter Single Sign-On Administrators group. |
By adding an Active Directory security group as a member of the Administrators group, you can manage user access with administrative rights to the vCenter Single Sign-On built-in identity provider based on your organization's personas. |
|
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
IAM-VCS-SEC-008 |
Configure the global password expiration policy for each vCenter Server instance. |
You configure the global password expiration policy for each vCenter Server instance to align with the requirements of your organization which might be based on industry compliance standards. |
You must manage the password expiration policy on each vCenter Server instance by using the vCenter Server Management Interface. |
IAM-VCS-SEC-009 |
Configure the local user password expiration policy for each vCenter Server instance. |
|
You must manage the local user password expiration settings on each vCenter Server instance by using both the vCenter Server Management Interface and the virtual appliance console. |
IAM-VCS-SEC-010 |
Configure the local user password complexity policy for each vCenter Server instance. |
|
|
IAM-VCS-SEC-011 |
Configure the local user account lockout policy for each vCenter Server instance. |
|
You must manage the local user account lockout settings on each vCenter Server instance by using the virtual appliance console. |
IAM-VCS-SEC-012 |
Configure the password expiration policy for the vCenter Single Sign-On built-in identity provider. |
|
You must manage the password expiration policy for the vCenter Single Sign-On built-in identity provider by using the vSphere Client. |
IAM-VCS-SEC-013 |
Configure the password complexity policy for the vCenter Single Sign-On built-in identity provider. |
|
|
IAM-VCS-SEC-014 |
Configure the account lockout policy for the vCenter Single Sign-On built-in identity provider. |
|
You must manage the password expiration policy for the vCenter Single Sign-On built-in identity provider by using the vSphere Client. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
IAM-VCS-SEC-015 |
For each vCenter Server instance, change the vCenter Server virtual appliance root account password on a recurring or event-initiated schedule by using SDDC Manager. |
|
You must manage the password update or an automated password rotation schedule (default) for the root account by using SDDC Manager. |
IAM-VCS-SEC-016 |
Change the vCenter Single Sign-On domain administrator SYSTEM account (for example, [email protected]) password in the vCenter Single Sign-On built-in identity provider on a recurring or event-initiated schedule by using SDDC Manager. |
|
You must manage the password update or an automated password rotation schedule for the SYSTEM account by using SDDC Manager. |
IAM-VCS-SEC-017 |
Rotate the passwords for SDDC Manager SERVICE account types in the vCenter Single Sign-On built-in identity provider on a recurring or event-initiated schedule by using SDDC Manager. |
|
You must manage the password rotation or an automated password rotation schedule for the SERVICE account by using SDDC Manager. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
IAM-NSX-SEC-001 |
Configure Active Directory over LDAP as the authentication source for the NSX Local Managers. |
Provides integration with Active Directory for role-based access control. You can introduce authorization policies by assigning roles to Active Directory security groups. |
None. |
IAM-NSX-SEC-002 |
Assign the default Enterprise Admin role in NSX Manager to an Active Directory security group. |
By assigning the Enterprise Admin role to an Active Directory security group, you can simplify and manage user access to NSX by using the enterprise administrative access controls in Active Directory. |
|
IAM-NSX-SEC-003 |
Assign the default Network Admin role in NSX Manager to an Active Directory security group. |
By assigning the Network Admin role to an Active Directory security group, you can simplify and manage user access to NSX by using the enterprise administrative access controls in Active Directory. |
|
IAM-NSX-SEC-004 |
Assign the default Auditor role in NSX Manager to an Active Directory security group. |
By assigning the Auditor role to an Active Directory security group, you can simplify and manage user access to NSX by using the enterprise administrative access controls in Active Directory. |
|
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
IAM-NSX-SEC-005 |
Configure the password expiration policy for each NSX Local Manager cluster. |
|
You must manage the password expiration policy on each NSX Local Manager cluster using the CLI or an API. |
IAM-NSX-SEC-006 |
Configure the password complexity policy for each NSX Local Manager cluster node. |
You configure the password complexity policy for each NSX Local Manager cluster node to align with the requirements of your organization which might be based on industry compliance standards. |
|
IAM-NSX-SEC-007 |
Configure the account lockout policy on each NSX Local Manager cluster to configure the account lockout policy and set the lockout behavior for the API, CLI, and user interface. |
You configure the account lockout policy for each NSX Local Manager cluster to align with the requirements of your organization which might be based on industry compliance standards. |
You must manage the account lockout policy on each NSX Local Manager cluster by using the virtual appliance console. |
IAM-NSX-SEC-008 |
Configure the password expiration policy for each NSX Edge node. |
|
You must manage the password expiration policy on each NSX Edge node by using the virtual appliance console. |
IAM-NSX-SEC-009 |
Configure the password complexity policy for each NSX Edge node. |
You configure the password complexity policy for NSX Edge nodes to align with the requirements of your organization which might be based on industry compliance standards. |
|
IAM-NSX-SEC-010 |
Configure the account lockout policy on each NSX Edge node to configure the account lockout policy and set the lockout behavior for the CLI. |
You configure the account lockout policy for NSX Edge nodes to align with the requirements of your organization which might be based on industry compliance standards. |
You must manage the account lockout policy on each NSX Edge node by using the virtual appliance console. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
IAM-NSX-SEC-011 |
|
|
|
IAM-NSX-SEC-012 |
|
|
|
IAM-NSX-SEC-013 |
For VMware Cloud Foundation 5.0 and earlier, for each VI workload domain NSX Local Manager cluster, change the audit account password on a recurring or event-initiated schedule by using the API or CLI. |
|
|
IAM-NSX-SEC-014 |
For each NSX Edge cluster deployed and managed by SDDC Manager, change the root, admin, and audit account passwords for each NSX Edge node on a recurring or event-initiated schedule by using SDDC Manager. |
|
|
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
IAM-SDDC-SEC-001 |
Assign the Admin role in SDDC Manager to an Active Directory security group. |
By assigning the Admin role to an Active Directory security group, you can simplify and manager user access with administrative rights to SDDC Manager. |
|
IAM-SDDC-SEC-002 |
Assign the Operator role in SDDC Manager to an Active Directory security group. |
By assigning the Operator role to an Active Directory security group, you can simplify and manage user access with operative rights to SDDC Manager. |
|
IAM-SDDC-SEC-003 |
Assign the Viewer role in SDDC Manager to an Active Directory security group. |
By assigning the Viewer role to an Active Directory security group, you can create user accounts that have read-only rights in SDDC Manager. |
|
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
IAM-SDDC-SEC-004 |
Configure the password expiration policy for the SDDC Manager appliance. |
|
You must manage the password expiration policy on the SDDC Manager appliance by using the virtual appliance console. |
IAM-SDDC-SEC-005 |
Configure the password complexity policy for the SDDC Manager appliance. |
|
You must manage the password complexity policy on the SDDC Manager appliance by using the virtual appliance console. |
IAM-SDDC-SEC-006 |
Configure the account lockout policy for the SDDC Manager appliance. |
|
You must manage the account lockout policy on the SDDC Manager appliance by using the virtual appliance console. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
IAM-SDDC-SEC-007 |
Change the SDDC Manager virtual appliance root, vcf, and backup account passwords on a recurring or event-initiated schedule by using the appliance shell. |
|
|
IAM-SDDC-SEC-008 |
Change the SDDC Manager local administrative admin@local account password on a recurring or event-initiated schedule by using the API. |
The password for the SDDC Manager local administrative admin@local account does not expire. |
|