Security Solution Architecture
Security Solution Architecture
BE N E F I TS
4
Vendor
Management Tools
6
3
5
3
View
Management
Security
Container(s)
Active
Directory
VMware vSphere
7
Figure 1: View Connection Sequence
The connection flow for VMware View can be simply described by the following steps:
1. A VMware View user using View Client connects to the View Security Server and authenticates
REFERENCE GUIDE / 1
The security practices should address user mobility, since the data
is centrally located and users can access the same data from many
different network nodes. The architecture implementation should
also cover major updates and patches that are applied to every
single desktop and pushed to the entire VDI deployment.
User Files
View
Management Tools
4
Vendor
Management Tools
6
3
5
User Files
View
Management Tools
4
Vendor
Management Tools
6
3
5
Security
Container(s)
VMware vSphere
Active
Directory
VMware vSphere
3
View
Management
Security
Container(s)
Active
Directory
S E C UR I T Y V UL N E R A BI LI TI E S
REFERENCE GUIDE / 2
Provisioning Desktop
View
Management Tools
6
3
Data Encryption
3
View
Management
Security
Container(s)
Active
Directory
VMware vSphere
User Files
View
Management Tools
4
S E C U R I T Y V U L N E R ABI LI TI ES
Vendor
Management Tools
3
View
Management
Security
Container(s)
Active
Directory
VMware vSphere
User Files
View
Management Tools
4
Vendor
Management Tools
5
3
View
Management
Security
Container(s)
Active
Directory
VMware vSphere
REFERENCE GUIDE / 3
Desktop Configuration
User Files
View
Management Tools
10.50.63.96/27
(Management Network)
4
Vendor
Management Tools
dVS
Management Cluster
View 5.0
Splunk
Rapid 7
View
Management
Security
Container(s)
Active
Directory
VMware vSphere
vCM
vShield Manager
Microsoft
S E C U R I T Y V UL N E R A BI LI TI ES
RE ME D I AT I O N / SO LUTI O N
Catbird
Firewall
IDS/IDP
and
Flow
Monitor
Vulnerability
Management
Layer 2
Access
Control
Virtual
Infrastructure
Monitoring
Auditing
Corp
VDI Pool
Trust Zone
Figure 8: Real-Time Compliance Metrics and Reporting with Multi-Functional Policy
Enforcement
REFERENCE GUIDE / 4
Trust Zone
Trust Zone
Doctors
Firewalll
Corp
Trust Zone
Firewalll
internet
e t
Figure 10: Using vShield App and Edge to Define the Geo and Network Boundaries
REFERENCE GUIDE / 5
Compliance Template
(HIPAA, SOX, FISMA, PCI, DIACAP, and COBIT)
Compliance requires collection and correlation of data from
multiple technical controls. Every mandate contains different sets
of technical controls. In-depth controls for VDI include the
following:
Inter-network segmentation
Intra-network and inter-VM segmentation
Layer 2/3/4 controls
REFERENCE GUIDE / 6
Summary
Security vendors realize that the enterprise perimeter and desktop security vulnerabilities have changed. Firewalls with basic allow/deny rule
sets, based on IP addresses and application ports, are not flexible enough for the dynamic type of connectivity enterprises required with
outside partners, part-time contractors and guests, as well as an increasingly mobile work force. Perimeter security access technology now
adapts to become more aware of applications, virtual desktop use cases, end-user identity, and enterprise policy.
VMware partner products and solutions integrated with the VMware security framework meet these updated security requirements. A
security solution architecture dashboard easily showcases multiple security aspects and considerations for an end-to-end VDI practice.
The solution architecture presents one of the many security options you can consider, not *the* only option.
Authors
This brief was prepared by the Solution Management Team in the VMware End User Computing business unit. The Solution Management Team
is responsible for architecting and validating both horizontal and vertical solutions that feature VMware View along with requisite partner
products. For this paper, integration efforts were provided by security architects from VMware and teams at our partner organizations.
A summary of the VMware and partner products used in the security architecture for VDI is provided in the chart below.
REFERENCE GUIDE / 7