VMware Cloud services rely on layers of network security and build on top of the base network security provided by IaaS providers. As a customer, for guidance on implementing a secure environment, you can access the documentation or contact the technical support team.

Network architecture diagrams that include data flows between security domains and zones are updated regularly. Policies, procedures, and configurations protect the VMware network environments. Wireless networks are not used to connect directly to the production environment.

Network diagrams and data flow clearly identify high-risk environments and systems that have legal compliance impacts. VMware has implemented technical measures and applies defense-in-depth techniques for detection and timely response to network-based attacks associated with anomalous ingress or egress traffic patterns and distributed denial-of-service (DDoS) attacks.

The security controls of VMware reduce the risk of unauthorized access to sensitive information in the production environment. VMware Cloud services have several intrusion detection mechanisms to collect and monitor the environment logs correlated with both public and private threat feeds to spot suspicious and unusual activities.

For VMware Cloud on Dell EMC, VMware uses VeloCloud SD-WAN to create an encrypted tunnel to each customer location for a management access to the SDDC. Policies are applied to segment customer networks.