5.7

Table Of Contents
Requirement Infrastructure
Zone
Server
Zone
UI
Zone
Agent
Zone
Cryptographic service providers are FIPS-140
validated.
X X
Only trusted software is installed in the zone. X X X
Access to machine configuration settings is
restricted.
X X X X
Routine backups, patches, and virus scanning are
performed.
X X X X
Table 11. Zones and Requirements
The provisioning zone is not listed in the table. For provisioning details, see "Software Provisioning
Components" on page 45 or "Operating System Provisioning Components" on page 49 .
Introduction to VCM Security
VMware, Inc.
13