Summary
This table summarizes the steps taken to ensure that servers are extremely resistant to security breaches.
Action | Implementation |
---|---|
User Authentication | Leveraging features within VMware vSphere and Microsoft, Zerto limits users who can access the Virtual Replication Appliance through authentication. |
Communications to VMware vSphere | Using standard APIs, Zerto is able to securely communicate with the VMware components. |
Network Services | The Virtual Replication Appliance limits the number of running services. By default, it runs only the Zerto protocols and SSH. |
Port Configuration | Zerto has been configured to use the minimum number of ports to ensure the security of the environment. See the ports usage table, above. |
Network Encryption | Communications between VMware vSphere components and across the network is encrypted. |
Roles, Permissions, and Privileges | Zerto activities are assigned to an administrator within your organization to ensure that the right person is able to execute Zerto. |
Log Settings | Zerto produces various logs. Event logs and alerts are viewable from the vSphere Client console |