5.1

Table Of Contents
vShield Data Security Management 15
vShield Data Security provides visibility into sensitive data stored within your organization's virtualized and
cloud environments. Based on the violations reported by vShield Data Security, you can ensure that sensitive
data is adequately protected and assess compliance with regulations around the world.
To begin using vShield Data Security, you create a policy that defines the regulations that apply to data security
in your organization and specifies the areas of your environment and files to be scanned. A regulation is
composed of content blades, which identify the sensitive content to be detected. vShield supports PCI, PHI,
and PII related regulations only.
When you start a Data Security scan, vShield analyzes the data on the virtual machines in your vSphere
inventory and reports the number of violations detected and the files that violated your policy.
You can perform all data security tasks using REST APIs. For more information, see the vShield API
Programming Guide.
This chapter includes the following topics:
n
“vShield Data Security User Roles,” on page 177
n
“Defining a Data Security Policy,” on page 178
n
“Editing a Data Security Policy,” on page 180
n
“Running a Data Security Scan,” on page 180
n
“Viewing and Downloading Reports,” on page 181
n
“Creating Regular Expressions,” on page 182
n
“Available Regulations,” on page 182
n
“Available Content Blades,” on page 197
n
“Supported File Formats,” on page 216
vShield Data Security User Roles
A user's role determines the actions that the user can perform.
Role Actions Allowed
Security Administrator Create and publish policies and view violation reports. Cannot start or stop a data security scan.
vShield Administrator Start and stop data security scans.
Auditor View configured policies and violation reports.
VMware, Inc. 177