
vCenter Configuration Manager Security Environment Requirements
TECHNICAL WHITE PAPER / 4
12.3 Accept only reputable software package publishers 26
12.4 Configure only trusted sources over secure channels 26
12.5 Take precautions when using VCM Software Provisioning Extensions 26
13.0 Proper Decommissioning 28
13.1 An installation of VCM is properly decommissioned before its hardware is repurposed or
retired 28
13.2 Collector and Agent private keys used for TLS are not copied between machines 28
13.3 Enterprise certificate private key and IIS (for HTTPS) host private keys are transferred manually 29
13.4 Server zone hosts have their disks removed and transferred, secured, or erased before decom-
missioning 29
13.5 Agent private keys are erased at Agent install 29
13.6 Unused network authority accounts are disabled or removed 29
References 30
Comentários a estes Manuais