1. Overview

Due to the increasing footprint of technology and related complexities it is becoming more challenging for organizations to ensure security in their environment. A predefined policy from the regulations and accrediting organizations helps in reducing the complexity and removes unnecessary duplication of effort and activity from resources. A few examples of such policies are PCI-DSS in the financial industry and HIPAA in healthcare.

The end customers are also demanding that businesses comply to industry-wide security standards while providing their service. For these reasons, instead of defining their own proprietary policies, businesses are either directly adopting these set standards or taking these as base policy and further customizing it to suit their need.

While these guiding policies ensures the initial configuration is compliant to the security requirements, how do we ensure the environment is continuously compliant to the defined standards? This is where vRealize Operations helps. Use it to monitor the continuous compliance of the environment. The rest of the chapter will describe how we can achieve this.


This page was last updated on June 22, 2021 by Stellios Williams with commit message: "Fixed MD syntax, added alt-text, reduced lvl 5 to lvl 4, added notice shortcode, re-added footnotes"

VMware and the VMware taglines, logos and product names are trademarks or registered trademarks of VMware in the U.S. and other countries.