5.8

Table Of Contents
Requirement Infrastructure
Zone
Server
Zone
UI
Zone
Agent
Zone
Cryptographic service providers are FIPS-140
validated.
X X
Only trusted software is installed in the zone. X X X
Access to machine configuration settings is
restricted.
X X X X
Routine backups, patches, and virus scanning are
performed.
X X X X
Table 11. Zones and Requirements
Introduction to VCM Security
VMware, Inc.
13