Security Guidelines for Your IaaS Provider
Page last updated:
This topic provides security guidelines for the Infrastructure as a Service (IaaS) providers supported by Pivotal Platform.
Pivotal Platform supports a variety of IaaS providers. Different IaaS providers require different configuration steps to secure user data, identity information, and credentials.
Security requirements can vary broadly based on the unique configuration and infrastructure of each organization. Rather than provide specific guidance that may not apply to all use cases, Pivotal has collected links to IaaS providers’ security and identity management documentation. The documents below may help you understand how your IaaS’ security requirements impact your Pivotal Platform deployment.
Pivotal does not endorse these documents for accuracy or guarantee that their contents apply to all Pivotal Platform installations.
Find your IaaS provider in the list below. The documentation items linked for each IaaS may help you configure and secure your installation infrastructure.
These topics in the AWS documentation provide a general reference for AWS’ Identity and Access Management (IAM) features:
AWS Identity and Access Management Guide: If you are new to AWS, start here.
Identities (Users, Groups, and Roles) in the AWS Identity and Access Management Guide
Temporary Security Credentials in the AWS Identity and Access Management Guide: This documentation provides a general definition of IAM terms and provide best practices to help you manage IaaS users and permissions.
This topic in the GCP documentation describes general authentication guidelines for GCP:
This topic in the Microsoft Azure documentation describes managing IaaS users and credentials:
These topics in the OpenStack documentation provide a general reference for OpenStack service credential management:
Configuring service credentials in Configure the deployment
This topic in the VMware vSphere documentation describes best practices for securing and managing a vSphere installation: