Download vShield Administration Guide - vShield Manager 5.5
Transcript
vShield Data Security Management 15 vShield Data Security provides visibility into sensitive data stored within your organization's virtualized and cloud environments. Based on the violations reported by vShield Data Security, you can ensure that sensitive data is adequately protected and assess compliance with regulations around the world. To begin using vShield Data Security, you create a policy that defines the regulations that apply to data security in your organization and specifies the areas of your environment and files to be scanned. A regulation is composed of content blades, which identify the sensitive content to be detected. vShield supports PCI, PHI, and PII related regulations only. When you start a Data Security scan, vShield analyzes the data on the virtual machines in your vSphere inventory and reports the number of violations detected and the files that violated your policy. You can perform all data security tasks using REST APIs. For more information, see the vShield API Programming Guide. This chapter includes the following topics: n “vShield Data Security User Roles,” on page 183 n “Defining a Data Security Policy,” on page 184 n “Editing a Data Security Policy,” on page 186 n “Running a Data Security Scan,” on page 187 n “Viewing and Downloading Reports,” on page 187 n “Creating Regular Expressions,” on page 188 n “Available Regulations,” on page 188 n “Available Content Blades,” on page 204 n “Supported File Formats,” on page 223 vShield Data Security User Roles A user's role determines the actions that the user can perform. Role Actions Allowed Security Administrator Create and publish policies and view violation reports. Cannot start or stop a data security scan. vShield Administrator Start and stop data security scans. Auditor View configured policies and violation reports. VMware, Inc. 183