On this page I will collect posts, links and other helpful informations regarding Security which is an extremely important and essential part of the SDDC.
https://www.vmware.com/security/cloud-security.html
// Security Links
Log4j vulnerability
https://focus.sva.de/kritische-schwachstelle-log4shell/
https://www.bsi.bund.de/DE/Themen/Unternehmen-und-Organisationen/Informationen-und-Empfehlungen/Empfehlungen-nach-Angriffszielen/Webanwendungen/log4j/log4j_node.html
https://github.com/mergebase/log4j-detector
https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592
https://blogs.vmware.com/security/2021/12/investigating-cve-2021-44228-log4shell-vulnerability.html
https://www.vmware.com/security/advisories/VMSA-2021-0028.html
https://kb.vmware.com/s/article/87081 (vCenter)
https://kb.vmware.com/s/article/87086 (NSX-T <= 3.1.3)
https://kb.vmware.com/s/article/87099 (NSX-v)
https://kb.vmware.com/s/article/87095 (VCF)
https://kb.vmware.com/s/article/87097 (vRSLCM)
https://kb.vmware.com/s/article/87076 (vROps)
https://kb.vmware.com/s/article/87089 (vRLI)
https://kb.vmware.com/s/article/87135 (vRNI)
https://www.dell.com/support/kbdoc/de-de/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
https://www.dell.com/support/kbdoc/de-de/000194466/dsa-2021-265-dell-emc-vxrail-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228
https://www.dell.com/support/kbdoc/de-de/000194458/vxrail-vxrail-manager-workaround-to-remediate-log4shell
https://success.trendmicro.com/solution/000289940
https://log4j-tester.trendmicro.com/