Security Guidelines for Your IaaS Provider

Page last updated:

This topic provides security guidelines for the Infrastructure as a Service (IaaS) providers supported by Pivotal Platform.


Pivotal Platform supports a variety of IaaS providers. Different IaaS providers require different configuration steps to secure user data, identity information, and credentials.

Security requirements can vary broadly based on the unique configuration and infrastructure of each organization. Rather than provide specific guidance that may not apply to all use cases, Pivotal has collected links to IaaS providers’ security and identity management documentation. The documents below may help you understand how your IaaS’ security requirements impact your Pivotal Platform deployment.

Pivotal does not endorse these documents for accuracy or guarantee that their contents apply to all Pivotal Platform installations.

Find your IaaS provider in the list below. The documentation items linked for each IaaS may help you configure and secure your installation infrastructure.

Amazon Web Services (AWS)

These topics in the AWS documentation provide a general reference for AWS’ Identity and Access Management (IAM) features:

Google Cloud Platform (GCP)

This topic in the GCP documentation describes general authentication guidelines for GCP:

Microsoft Azure

This topic in the Microsoft Azure documentation describes managing IaaS users and credentials:


These topics in the OpenStack documentation provide a general reference for OpenStack service credential management:

VMware vSphere

This topic in the VMware vSphere documentation describes best practices for securing and managing a vSphere installation: