Security & Compliance in VMware vSphere+ Subscription


VMware vSphere+ Subscription brings the functionality of VMware Cloud to on-premises infrastructure deployments, reducing infrastructure maintenance costs, optimizing operations, and speeding up security response. To enable VMware vSphere+ Subscription there are communications and permissions changes necessary to support these operations. This document is intended to clarify and document security & compliance differences between traditional vSphere deployments and Cloud-enabled environments, document product goals, and answer questions.

If you would like to know more about VMware Cloud Foundation Security & Compliance, please refer to:




This set of documents is intended to provide guidance for organizations that are considering VMware solutions to help them address compliance requirements. The information contained in this document is for educational and informational purposes only. This document is not intended to provide regulatory advice and is provided “AS IS.” VMware makes no claims, promises, or guarantees about the accuracy, completeness, or adequacy of the information contained herein. Organizations should engage appropriate legal, business, technical, and audit expertise within their specific organization for review of security and regulatory compliance requirements.


Intended Audience

This document is intended only for customers deploying and operating VMware vSphere+ Subscriptions. Security and compliance recommendations are nuanced and may differ between products and releases. Please only use security guidance intended for the specific product and version you are running.


Download the Latest Version

This document will evolve. The most up-to-date version can be found at:



VMware vSphere+ Subscription creates a shared responsibility and security model for on-premises managed vSphere components. This model intends to:

  • Minimize friction. Initial setup will require some opt-in configuration and permissions adjustments but will be kept to a minimum. Users should be able to easily set up, monitor, and revoke permissions when needed.
  • Limit access. VMware Support Team will only have access and ability to perform the following operations:
    • vCenter Server monitoring
    • VMware will not have access to customer workloads
    • Only VMware Support teams will have access to specific monitoring data
    • This data will not be used for any marketing purposes
  • Promote transparency. Customers will have visibility into which actions are planned, currently being executed, and have been executed in the past.



Term Definition

Site Reliability Engineer (SRE)

VMware staff that use software engineering practices while solving IT infrastructure and operations problems. At VMware, these people conduct the day-to-day operations for VMware Cloud and vSphere Cloud.

VMware vCenter Server (vC)

VMware vCenter Server is the centralized server management console for controlling vSphere environments. It is delivered as a virtual appliance.

VMware vCenter
Cloud Gateway

The vCenter Cloud Gateway is a virtual appliance enables hybrid cloud use cases where on-premises resources are connected to cloud resources.

VMware Hypervisor

The VMware Hypervisor, ESXi, enables virtualization of servers to consolidate applications and workloads while increasing their manageability. ESXi runs on bare metal.

VMware vSphere

VMware vSphere is the combination of ESXi and vCenter Server that enables advanced functionality and manageability in the software-defined data center.

VMware vSphere+

VMware VMware vSphere+ Subscription is the version of vSphere that also includes the vCenter Cloud Gateway, allowing hybrid manageability of on-premises deployments.


Virtual Appliance Management Interface (VAMI) is the web interface for vSphere Administrators to configure and maintain VMware products that are delivered as appliances.


Product Changes to Support VMware vSphere+ Subscription

Users and organizations will continue to access vCenter Server and ESXi hosts with no change. All current integrations such as plugins into vCenter, APIs, CLIs will continue to perform as they would in a typical on-premises configuration.

There are two aspects to vSphere+ Subscription: Subscribing vSphere deployments to vSphere+ and enabling vCenter Server for simplified lifecycle management.

Subscribing vSphere Deployments to vSphere+

In order to subscribe a vSphere deployment to vSphere+ customers must:

  1. Download, install, and configure a VMware Cloud Gateway.
  2. Connect and authenticate to VMware Cloud using HTTPS (443/tcp).
  3. Register vCenter Server with the Cloud Gateway. vCenter Server credentials are never sent to the VMware Cloud.
  4. Click on "Subscribe" in the VMware Cloud portal for the vCenter Server, which then activates vSphere+ services for that vCenter Server and the associated ESXi hosts.


To perform these actions vSphere+ Subscription creates new vCenter Server user accounts:

Purpose User Group Privileges
Licensing license-service-admin LicenseService.Administrators Read-only role for inventory and licensing operations
Configuration Management system-config-admin SystemConfiguration.Administrators Read-only role to collect vCenter Server configuration data
Statistics Collection vstats-admin vStatsGroup Read-only role to collect vCenter Server performance data
Log Collection syslog-admin SyslogConfiguration Read-only role to collect vCenter Server log data


Enabling vSphere+ Simplified Lifecycle Management

Customers that intend to use the optional simplified vCenter Server lifecycle management will have two additional accounts created with the following privileges:

Purpose User Group Privileges

Lifecycle, Backup, Restore



Admin Privileges




Admin Privileges


Connections to VMware Cloud Services

Initial connections will need to be made between on-premises instances and VMware Cloud services using credentials for VMware Cloud. Customers will need to create an account for VMware Cloud ( prior to being able to connect.

A temporary authorization code will be generated on the Cloud Gateway Appliance to identify and verify it to the VMware Cloud services.


Questions & Answers

  • Does VMware vSphere+ Subscription use VMware Cloud Services?

Yes, the VMware vSphere+ Subscription offering connects to services that are part of VMware Cloud.


  • Do VMware Cloud services have regulatory compliance information available?

The VMware Cloud Trust Center is a collection of information about security, privacy, compliance, and resiliency for the VMware Cloud services. You can find it at:


  • Does VMware vSphere+ Subscription require a VPN to the public cloud?

No. Data is transmitted over standard TLS-encrypted connections from the vCenter Cloud Gateway to the VMware Cloud, on outbound TCP port 443 only. vCenter Servers are connected to vCenter Cloud Gateway and not directly to the Internet. There is no impact to vCenter Server, ESXi host, and/or VM connectivity. ESXi hosts continue to be connected only to vCenter Server. There is no need for vCenter Cloud Gateway to connect with ESXi hosts or your virtual machines. All communication is between vCenter Server through vCenter Cloud Gateway to VMware Cloud.


  • Do I need to place my vCenter Server on the Internet for this service?

No. VMware always recommends practicing defense-in-depth by maintaining layers of independent security controls. To that end, please do not place vCenter Server, ESXi, storage, network, or other management interfaces directly on the public Internet.


  • Will my workloads continue to run if my Internet connection is offline?

Yes, vSphere and workloads continue to operate if the Internet connection is offline (providing that they do not require that network connection, of course).


  • What connections does VMware vSphere+ make to VMware Cloud services?

Connections to VMware Cloud services are through the vCenter Cloud Gateway, which is an appliance deployed on-premises that aggregates and centralizes interactions with the Cloud services. The cloud gateway requires the ability to connect to the following URLs via HTTPS (443/tcp):

  • *


Please check latest documentation for up-to-date Cloud Gateway Requirements.


  • What operating system(s) does the vCenter Cloud Gateway run on?

Photon OS.

VMware ESXi, and products deployed as appliances are atomic units, supported in full by VMware, and managed and patched as a single entity. VMware does not support management or changes to the appliances outside of published APIs and user interfaces. This includes changes to the hardware compatibility of the appliance, sizing of the appliance, and changes to the internal configurations of the appliance except when done through supported product management interfaces like the VAMI.

Other interfaces, like SSH and the appliance shell/DCUI, are present for troubleshooting and support purposes. These support interfaces are shipped in a deactivated state and intended only for use as directed by VMware Global Support Services (GSS). When support and troubleshooting is concluded they should be returned to a deactivated state.

This delivery model is akin to that of a network switch, firmware to be updated as a single image, rather than an installed application. We encourage users to list the products as their own operating system in their organizational asset inventories, as they would with a network or SAN switch firmware. For example, the operating system for vCenter Server 7 would be “VMware vCenter Server 7.” This helps prevent misunderstandings about updates, patching, and support boundaries during audits and vulnerability assessment and remediation.


  • Do I need to deploy the VMware Cloud Gateway?

Yes, the gateway is what connects vSphere to VMware Cloud.  

For more information on the different appliances needed to connect the different offerings within VMware Cloud Services, please refer to:


  • Does the VMware vCenter Cloud Gateway need to be on the Internet?

No. It should be placed behind your perimeter firewalls.


  • Are passwords & sensitive information transmitted to VMware Cloud?

No. VMware vSphere+ administrators will only need to enter usernames and passwords on the Cloud Gateway appliance to create the connections to the VMware Cloud and to the on-premises vCenter Servers. This authentication information is never sent to the cloud.


  • How will users be informed of security vulnerabilities and disclosures?

VMware has a robust process for handling security issues, following the industry-standard “responsible disclosure” model. When security vulnerabilities are disclosed to users it will be as a VMware Security Advisory (VMSA) and will be posted at:

We strongly urge all VMware customers to subscribe to the VMSA mailing list, found on the link above.


  • What types of data are collected and sent to VMware Cloud?

VMware will collect product data required to manage the respective VMware vSphere+ Subscription deployments. See following section.


  • How is customer data protected?

VMware has implemented technical, administrative, and organizational safeguards to ensure a least-privilege style of access to the information collected. All VMware employees must receive training and obtain certification for responsible use and handling of collected data.


  • Who has access to VMware vSphere+ Subscription data?

Data is accessible on a need-to-know basis to employees who perform support and management activities on VMware vSphere+ services inside VMware Cloud. The tools, processes and teams are same as our current Support methods for any VMW products and services. Data can be shared across VMware teams to enable cross-product correlation and analysis. VMware employees must complete product usage data training and receive management approval prior to gaining access to the data.


  • Will VMware share data with third parties?

Data is not shared with partners or third parties.


  • Does VMware have data retention processes?

Data is kept only if needed for specific, defined uses, and no longer than necessary for these purposes.


  • This document does not contain information about security hardening for VMware vSphere+. Where can I find guidance on that?

VMware publishes the vSphere Security Configuration Guide which serves as the baseline for security hardening. The recommendations apply to VMware vSphere+ as well. You can find the latest copy at:

In all cases, whether traditional vSphere or modern VMware vSphere+ deployments, we strongly recommend applying the latest product patches, employing strong access control technologies like multi-factor authentication (MFA), and practicing least-privilege and zero trust by restricting access to hardware, appliance, and vSphere management interfaces.


  • Do you have further questions not covered in this section?

This QA was intended to cover most common security questions related to vSphere+ implementation. We have a dedicated technical QA blog entry covering other topics such as vSphere+ Architecture. Here. If you would like us to follow up in any area please share feedback or contact your account team. 


Data Transmitted to VMware Cloud

Data Type Data Fields Frequency Transmitted Data Retention Period
vCenter Server Inventory
  • General inventory information of vSphere objects managed by vCenter Server. This includes vCenter Server itself, VMs, hosts, clusters, Datastores, etc. 
  • Events & Alarms pertaining to vSphere objects. 
  • Version information for vSphere objects such as patch levels and virtual hardware version information for workloads.
  • If vSAN+ is enabled then vSAN datastore inventory information is collected.

After object creation and synced every 24 hours.

  • The VC inventory data is collected whenever there is a CRUD operation in the Inventory objects. Inventory data is retained in the Cloud as long as the respective object exists in the vCenter.
  • Event data is retained only for 24 hours.
Consumption Data
  • CPU and CPU Core usage and allocation for metering and billing purposes
15 minutes

Consumption data is retained as long as the respective vCenter is registered in the cloud.

Gateway Logs
  • Data collected regarding cloud gateway (support logs)
  • Data collected as part of Cloud Gateway audit logs
Continuous 30 days
  • At first subscription vCenter Server is entitled, and in turn entitles ESXi hosts
As necessary Entitlement data is retained as long as the vCenter is registered in the cloud. Unregistering the vCenter deletes the data.



Deployment Scenarios

image 339



The following certifications are present with evidence available through your account team:

  • ISO 27001
  • ISO 27017
  • ISO 27018
  • SOC2 Type2


Additional compliance work is in progress for PCI DSS, SOC3, DoD, and FedRAMP.

You can also find more information at VMware Trust Center:

Filter Tags

Compliance Security Cloud Foundation Cloud Foundation+ vSAN vSAN+ vSphere vSphere+ Document