Security Design Decisions
The following table lists the security storage design decisions made for this architecture design.
Table 81. Security Design Decisions
| Decision ID | Design Decision | Design Justification | Design Implication |
|---|---|---|---|
| For this design, <Customer> has made the following decisions listed in this table. | |||
| ESXi hosts and vCenter Server are secured as defined in their respective logical designs. | Limiting user access and configuring appropriate security is a must for the virtualized environment. | None. |