Security Guidelines for Your IaaS Provider

Page last updated:

Pivotal Platform supports a variety of Infrastructure as a Service (IaaS) providers. Different IaaS providers require different configuration steps to secure user data, identity information, and credentials.

Security requirements can vary broadly based on the unique configuration and infrastructure of each organization. Rather than provide specific guidance that may not apply to all use cases, Pivotal has collected links to IaaS providers’ security and identity management documentation. The documents below may help you understand how your IaaS’ security requirements impact your Pivotal Platform deployment.

Pivotal does not endorse these documents for accuracy or guarantee that their contents apply to all Pivotal Platform installations.

How to Use This Topic

Find your IaaS provider in the list below. The documentation items linked for each IaaS may help you configure and secure your installation infrastructure.

Amazon Web Services (AWS)

Google Cloud Platform (GCP)

Microsoft Azure

  • Azure security documentation
    This site has documentation on Azure security tools. It provides a general guide to how to manage IaaS users and credentials.

OpenStack

VMware vSphere