VMware vSphere Virtual Machine Encryption Configuration (2024)

Table of Contents

  1. Closer Look at VMware vSphere Virtual Machine Encryption
  2. How is VMware Virtual Machine encryption implemented anyway?
  3. How is this helpful in the realm of securing virtual machine data?
  4. Implementing VMware Virtual Machine Encryption
  5. VMware VM Encryption Requirements
  6. Concluding Thoughts

One of the oldest known forms of security is encryption. Encryption generally uses a key of some sort to make data unreadable. Without the key, you can’t read the data. This technology has been used time and time again and has been improved upon by various security technologies and encryption algorithms.

Today’s encryption technology is extremely powerful and is a tremendously effective mechanism in preventing unwanted theft of data. Even if the raw data is stolen, it can’t be read without the proper key to decrypt the data. Virtualized environments have adopted this technology. VMware has implemented the ability to do virtual machine encryption in vSphere 6.5.

Protect Your Data with BDRSuite

Cost-Effective Backup Solution for VMs, Servers, Endpoints, Cloud VMs & SaaS applications. Supports On-Premise, Remote, Hybrid and Cloud Backup, including Disaster Recovery, Ransomware Defense & more!

Learn More

In this post, we will take a closer look at VMware vSphere virtual machine encryption configuration, how the technology protects your data and how it is implemented.

Closer Look at VMware vSphere Virtual Machine Encryption

How is VMware Virtual Machine encryption implemented anyway?

VM encryption provides security to the VMDK that stores the data for a virtual machine. The I/O operations are encrypted from a virtual machine before they are written to the VMDK disk. Other files associated with the virtual machine are not encrypted due to their non-sensitive nature. These include the VM log files, configuration files, virtual disk descriptor files, etc.

How is this helpful in the realm of securing virtual machine data?

Imagine the scenario and use case of how this type of security protects your virtualized environment and perhaps, very sensitive data. If an unscrupulous system administrator or someone who has potential access to the VMware vSphere storage copied the virtual machine disk files to a removable device, they could take the disk to another VMware vSphere environment, import the virtual machine disk files into the new environment, power up the virtual machine, and have access to all the data stored on the virtual machine disk file that was copied from the source environment.

Another scenario might involve a domain controller. What if an employee or someone who gained access to VMware vSphere storage was able to copy a domain controller virtual machine to removable storage. They could then perform the same task as above and import the virtual machine into a new VMware vSphere environment, perhaps at home. Then they could run Active Directory password utilities relentlessly against the environment, completely outside the scanning, alerting, and other security mechanisms that might be running on-premises. Passwords can potentially be gathered from the “offline” Active Directory environment and provide an extremely dangerous security situation if this goes undiscovered. The employee could have access to domain admin credentials and potentially impersonate other users, compromising data, stealing data, and even other outcomes.

The above scenarios are only a couple of examples of how unencrypted data can be compromised. Virtual machine disks that are not encrypted are fully readable with no special effort on the part of the attacker outside of having access to the data. Once virtual machine encryption is introduced into the environment, it becomes exponentially more difficult to compromise data, even if you have access to the virtual machine storage.

Implementing VMware Virtual Machine Encryption

So with all the added security benefits to encrypting VMware virtual machines, this is certainly a security feature that most will want to take a look at to secure sensitive virtual machines running in the environment.

Let’s take a look at the requirements and steps to enable virtual machine encryption in VMware vSphere.

VMware VM Encryption Requirements

  • Provision a supported Key Management Server cluster to issue encryption keys
  • Establish trust between VMware vCenter Server and the Key Management Server cluster
  • Change the storage policy to VM Encryption for virtual disks

The process to do this is straightforward and can easily be accomplished via the new fully-featured HTML 5 vSphere client in vSphere 6.7 Update 1.

The first requirement as listed is to provision a Key Management Server cluster.

Most will probably provision a virtual solution running by way of a virtual appliance either in a production or management cluster. The Key Management Server cluster or KMS cluster will most likely be made up of multiple nodes for resiliency and in accord with best practice.

The Key Management Server solution must support the Key Management Interoperability Protocol (KMIP) 1.1 standard to be used as a KMS solution in VMware vSphere. You can find out more about which solutions are supported in the VMware Compatibility Guide.

In the below walkthrough, we will add a supported KMS cluster server solution to the VMware vSphere environment for use with virtual machine encryption tasks.

Navigate to the Configure menu of the vCenter Server inside of the vSphere client. Click Key Management Servers > Add.

VMware vSphere Virtual Machine Encryption Configuration (2)

Adding a new Key Management Server in the properties of the VMware vCenter Server configuration

This will launch the Add KMS dialog box that will allow you to Create new cluster or point to an existing cluster. Below we are creating a new KMS cluster inside of the vCenter Server configuration. The process gathers the necessary configuration information including:

  • KMS Cluster configuration (create new or point to existing)
  • New cluster name with the choice to make the KMS cluster the default configuration
  • Server name – This is the friendly name in vCenter Server
  • Server address – The IP or FQDN of the KMS cluster
  • Server port – port the KMS server is listening on
  • Proxy address – (optional)
  • Proxy port – (optional)
  • User name – (optional)
  • Password – (optional)
VMware vSphere Virtual Machine Encryption Configuration (3)

Adding a new KMS cluster in the Key Management Server properties

You will see the Make vCenter Trust KMS dialog box open after establishing a connection to the KMS server cluster. Even though you click Trust in this step, there are further steps required for establishing trust in vCenter.

VMware vSphere Virtual Machine Encryption Configuration (4)

Connecting to the KMS configured

Notice the connection status shows Not connected (Trust not established View Details).

VMware vSphere Virtual Machine Encryption Configuration (5)

Viewing the trust status of the new KMS cluster in the vSphere client

If you click to View Details you will see the MAKE KMS TRUST VCENTER button. Click this button to open the further configuration for trusting the KMS server.

VMware vSphere Virtual Machine Encryption Configuration (6)

Make KMS Trust vCenter

This will launch a wizard to Make KMS trust vCenter with a few options. Since in the lab, I have a certificate downloaded from the KMS server and a private key, I will be uploading these to vCenter for establishing trust.

VMware vSphere Virtual Machine Encryption Configuration (7)

KMS certificate and private key upload to establish trust

In the Upload KMS Credentials you will see the Upload a file button for both the KMS Certificate and the KMS Private Key.

VMware vSphere Virtual Machine Encryption Configuration (8)

Uploading the certificate and private key

After uploading the certificate and private key, click the Establish Trust button.

VMware vSphere Virtual Machine Encryption Configuration (9)

Establishing Trust with the KMS cluster by using the KMS certificate and private key

Now, after establishing trust, you will see the connection status, vCenter Certificate Status, and KMS Certificate Status all showing with a green checkmark. Trust has been established.

VMware vSphere Virtual Machine Encryption Configuration (10)

Trust successfully established with the KMS cluster and vCenter

Now that the KMS cluster is in place, we can start encrypting virtual machine disks with the new functionality enabled by the KMS server. To encrypt virtual machine disks, right-click on a virtual machine in the vSphere client inventory, and choose VM Policies > Edit VM Storage Policies.

VMware vSphere Virtual Machine Encryption Configuration (11)

Enabling encryption with a VM Storage Policy

In the Edit VM Storage Policies dialog box, choose the VM Encryption Policy to enable encryption on the virtual machine disk(s). Note how you can granularly assign storage policies, including encryption on a per disk basis.

VMware vSphere Virtual Machine Encryption Configuration (12)

Assigning a VM Encryption Policy for a VM disk

After assigning the VM encryption policy, you will see the Encryption section under the virtual machine properties populated with the status of VM configuration files are encrypted. Hard disk is encrypted.

VMware vSphere Virtual Machine Encryption Configuration (13)

After assigning the VM encryption storage policy, the VM is now encrypted

Concluding Thoughts

Security provided by encryption is the de facto standard in making sure someone does not have unauthorized access to your data. Without the proper decryption mechanisms, the data is simply unreadable to someone without the decryption key. There is no question that VM encryption provides the ultimate level of security for the data found in VM virtual hard disk files. The new functionality contained in VMware vSphere to encrypt the VM configuration and hard disk files provides a powerful way to ensure that virtual machine data is not easily stolen, copied, or access in an unauthorized way outside of the sanctioned VMware vSphere infrastructure. As mentioned, the VM encryption process provides a great way to lockdown sensitive VMs such as domain controllers, sensitive file servers, and other use cases. Using the functionality of the KMS cluster, the VMs are encrypted using the issued keys and the data can be granularly encrypted at the per VMDK level. VMware continues to provide great functionality to ensure the security of virtual infrastructure and protect business-critical and sensitive data.

Follow our Twitter and Facebook feeds for new releases, updates, insightful posts and more.

Rate this post

VMware vSphere Virtual Machine Encryption Configuration (2024)

FAQs

How do I enable VM encryption in vSphere? ›

Encrypting of a virtual machine

Right-click on the virtual machine and from the VM Policies menu choose Edit VM Storage Policies . From the VM Storage Policies drop-down menu, choose VM Encryption Policy and click OK .

Are VMware VM configuration files encrypted? ›

VM encryption provides security to the VMDK that stores the data for a virtual machine. The I/O operations are encrypted from a virtual machine before they are written to the VMDK disk. Other files associated with the virtual machine are not encrypted due to their non-sensitive nature.

What are the different encryption options for VM? ›

There are several types of encryption available for your managed disks, including Azure Disk Encryption (ADE), Server-Side Encryption (SSE) and encryption at host.

How to secure a virtual machine in VMware? ›

Configure Security Settings: Harden your host and the VM's operating system by enabling strong passwords, disabling unnecessary accounts, and applying security patches. Use Anti-VM Detection Countermeasures: Some malware can detect that it's running in a virtual environment.

How to tell if a VM is encrypted? ›

Select the VM, then click on Disks under the Settings heading to verify encryption status in the portal. In the chart under Encryption, you'll see if it's enabled.

Do I need to encrypt VM? ›

Encryption will NEVER protect you from online attack as I already mentioned in the previous post as that means people can access the OS of the VM… thus all the files on the VM, unless the files are Encrypted (then you need file encryption or some Data Leak Prevention) which means they can copy but cannot use the files.

Should you encrypt VM? ›

Azure VM Encryption:

Encrypting the OS disk ensures that data remains inaccessible without the encryption key, deterring unauthorized access even if the disk is stolen. It adds an additional layer of security by preventing unauthorized access to data even if someone gains access to the VM through RDP.

What type of encryption does VMware use? ›

Two types of keys are used for VM encryption: Data encryption key (DEK): The ESXi host generates and uses internal keys to encrypt VMs and disks . These XTS-AES-256 keys are used as DEKs . Key encryption key (KEK): The vCenter Server instance requests AES-256 keys from the KMS .

What are the three 3 different encryption methods? ›

There are different types of encryption techniques, but the following three are the most common and widely used: Symmetric Encryption, Asymmetric Encryption, and Hashing.

Can ESXi be encrypted? ›

Some Virtual Machine Encryption tasks enables ESXi Host Encryption automatically if the account has the relevant privileges. One important thing, Virtual Machine Encryption can be enabled only if you enable the ESXi Host level encryption.

What are 4 ways to secure a virtual machine? ›

Keep your OS and applications current for both virtual and host machines. Isolate each virtual machine you have by installing a firewall. Only allow approved protocols to be deployed. Ensure that antivirus programs are installed on the virtual machines and kept current with updates.

What is protected virtual machine in VMware? ›

A “protected” VM is a VM that is contained in at least one protection group snapshot that has been replicated to a cloud file system.

How does VM encryption work? ›

The data is encrypted using your own account, so no one other than you can access it, unless you give them your credentials. It stops unauthorized access by not allowing anyone that does not have your user information from accessing it, just like every other form of encryption.

Top Articles
Bajaj Finance Share Price Today - Bajaj Finance Ltd Stock Price Live NSE/BSE
Best Prepaid Credit Card for a Teenager
Oldgamesshelf
Canya 7 Drawer Dresser
Pet For Sale Craigslist
855-392-7812
Canary im Test: Ein All-in-One Überwachungssystem? - HouseControllers
Craigslist Benton Harbor Michigan
Readyset Ochsner.org
Gabriel Kuhn Y Daniel Perry Video
Konkurrenz für Kioske: 7-Eleven will Minisupermärkte in Deutschland etablieren
Rls Elizabeth Nj
Best Cav Commanders Rok
A Fashion Lover's Guide To Copenhagen
Becky Hudson Free
World of White Sturgeon Caviar: Origins, Taste & Culinary Uses
Otr Cross Reference
W303 Tarkov
Everything You Need to Know About Holly by Stephen King
Betonnen afdekplaten (schoorsteenplaten) ter voorkoming van lekkage schoorsteen. - HeBlad
Moonshiner Tyler Wood Net Worth
Craigslist Blackshear Ga
Navy Female Prt Standards 30 34
Inter-Tech IM-2 Expander/SAMA IM01 Pro
St. Petersburg, FL - Bombay. Meet Malia a Pet for Adoption - AdoptaPet.com
Metro Pcs.near Me
2024 INFINITI Q50 Specs, Trims, Dimensions & Prices
Veracross Login Bishop Lynch
Adt Residential Sales Representative Salary
The Old Way Showtimes Near Regency Theatres Granada Hills
Puretalkusa.com/Amac
The EyeDoctors Optometrists, 1835 NW Topeka Blvd, Topeka, KS 66608, US - MapQuest
Bethel Eportal
Cookie Clicker Advanced Method Unblocked
Drift Hunters - Play Unblocked Game Online
Shelby Star Jail Log
Ultra Ball Pixelmon
Kiddie Jungle Parma
Duke Energy Anderson Operations Center
Transformers Movie Wiki
Kaiju Paradise Crafting Recipes
Walter King Tut Johnson Sentenced
11 Pm Pst
Empire Visionworks The Crossings Clifton Park Photos
Smith And Wesson Nra Instructor Discount
Emily Tosta Butt
Courses In Touch
Vintage Stock Edmond Ok
Candise Yang Acupuncture
White County
Rescare Training Online
Cara Corcione Obituary
Latest Posts
Article information

Author: Manual Maggio

Last Updated:

Views: 5697

Rating: 4.9 / 5 (49 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Manual Maggio

Birthday: 1998-01-20

Address: 359 Kelvin Stream, Lake Eldonview, MT 33517-1242

Phone: +577037762465

Job: Product Hospitality Supervisor

Hobby: Gardening, Web surfing, Video gaming, Amateur radio, Flag Football, Reading, Table tennis

Introduction: My name is Manual Maggio, I am a thankful, tender, adventurous, delightful, fantastic, proud, graceful person who loves writing and wants to share my knowledge and understanding with you.