
VMware, Inc. 67
8
vShieldDataSecurityprovidesvisibilityintosensitivedatastoredwithinyourorganization’svirtualizedand
cloudenvironments.BasedontheviolationsreportedbyvShieldDataSecurity,youcanensurethatsensitive
dataisadequatelyprotectedandassesscompliancewithregulationsaroundtheworld.
Thischapterincludesthefollowingtopics:
“vShieldDataSecurityUserRoles”onpage 67
“DefiningaDataSecurityPolicy”onpage 67
“SavingandPublishingPolicies”onpage 71
“DataSecurityScanning”onpage 73
“A n a l y z i n g Results”onpage 74
TobeginusingvShieldDataSecurity,youcreateapolicythatdefinestheregulationsthatapplytodata
securityinyourorganizationandspecifiestheareasofyourenvironmentandfilestobescanned.Whenyou
startaDataSecurityscan,vShieldanalyzesthedataonthe
virtualmachinesinyourvSphereinventoryand
reportsthenumberofviolationsdetectedandthefilesthatviolatedyourpolicy.
Afteryouanalyzetheresultsofthescan,youcanedityourpolicyasrequired.Whenyoueditapolicy,you
mustenableitbypublishingthechanges.
Notethatyoucannot
installvShieldDataSecurityusingaRESTAPI.ForinformationoninstallingvShield
DataSecurity,seethevShieldQuickStartGuide.
TodeployvShieldDataSecurity,youmustinstallthelatestversionofVMwareToolsoneachvirtualmachine
thatyouwanttoscan.ThisinstallsaThinAgent,which
allowstheSVMtoscanthevirtualmachines.
vShield Data Security User Roles
Auser’sroledeterminestheactionsthattheusercanperform.Ausercanonlyhaveonerole.Youcannotadd
aroletoauser,orremoveanassignedrolefromauser,butyoucanchangetheassignedroleforauser.
Defining a Data Security Policy
Inordertodetectsensitivedatainyourenvironment,youmustcreateadatasecuritypolicy.Youmustbea
SecurityAdministratortocreatepolicies.
vShield Data Security Configuration
8
Table 8-1. vShield Data Security User Roles
Role Actions Allowed
Enterpriseadministrator AllvShieldoperationsandsecurity.
vShieldadministrator vShieldoperationsonly:forexample,installvirtualappliances,andconfigureportgroups.
Securityadministrator Createandpublishpolicies,viewviolationreports.Cannotstartorstopdatasecurityscans.
Auditor Viewconfiguredpoliciesandviolationreports.Read‐only.
Comentarios a estos manuales