Security Credential Management
Security is central to DMC’s design. This section details how credentials, data, and execution processes are handled to minimize risk and ensure full transparency.
Security Summary
| Security Focus | DMC Approach |
|---|---|
| Credential Protection | Credentials exist only in memory, auto-erased after execution. |
| Data Security | Locally stored, AES-256 encrypted ZIP file. |
| Access Controls | Supports least privilege access for vCenter and guest VMs. |
| Customer Transparency | Provides full command list for review before upload. |
| No External Transmission | No automatic cloud upload—customer controls data sharing. |
Credential Handling
DMC requires temporary admin credentials to access vCenter and guest VMs. However, all credentials are handled securely and never persist beyond execution.
How Credentials Are Managed Securely
| Security Aspect | DMC Implementation |
|---|---|
| Storage of Credentials | Credentials are only stored in memory |
| Persistence | Credentials are immediately erased when DMC terminates. |
| Logging | No sensitive information (usernames/passwords) is logged. |
Key Security Feature: Credentials are never stored in files or databases—they exist only for the duration of execution.
Data Security & Encryption
All collected data is stored locally on the Windows jump box and is never transmitted externally automatically.
Encryption Process
- Data is stored in a password-protected ZIP file.
- AES-256 encryption secures all collected information.
- Customers receive a private decryption key for validation before upload.
Data Storage and Transmission Controls
| Security Aspect | DMC Implementation |
|---|---|
| Data Storage Location | Encrypted ZIP file on the Windows jump box. |
| Data Transmission | No automatic data transfer—manual review and upload required. |
| External Network Communication | DMC has no outbound connections beyond the customer’s network. |
Customer Transparency: Reviewing Commands
DMC offers full visibility into all commands executed on guest VMs to support trust and accountability.
- The complete list of command-line queries is available on the Captured Metrics page.
- Verbose logging is enabled by default, allowing customers to trace every command run during collection.
- Customers can review scan output locally to verify that collected metrics align with documented behavior and scope.