Lock down VMware vSphere with least-privilege and built-in anti-escalation controls
Quick summary Isolate management — separate VLAN/subnet, VPN/jump box, firewall rules. vmware.com +1 Use RBAC: create narrowly scoped custom roles in vCenter, avoid administrator@vsphere.local for day-to-day ops. techdocs.broadcom.com +1 Harden ESXi: enable Lockdown Mode, secure boot/UEFI, enable host firewall, disable unused services. techdocs.broadcom.com +1 Centralize identity + MFA (IDP/SAML/OIDC) for vCenter and require MFA for admin actions. StarWind KMS for VM encryption / vTPM for VMs that need strong protection. vmware.com Logging/monitoring/alerting to external SIEM (you use Graylog) and continuous audit of roles & config. vmware.com 1 — Architecture & network isolation (first, foundational) Actions Put vCenter, ESXi management interfaces (mgmt/vMotion/host management) on a dedicated management VLAN and subnet. Restrict access to that network by firewall to only jump hosts and approved admin IPs. vmware.com Require access to the ma...