VSphere VMs encryption: encrypt virtual machines - pt.3
VSphere VMs encryption: setup vCenter Server - pt.2
VSphere VMs encryption: KMS Server installation - pt.1 No additional hardware is required to encrypt and decrypt a virtual machine and the used processor should support AES-NI instructions set, enabled in the BIOS, to improve performance since encryption is a CPU intensive process. If you try to access the encrypted VMDK from an unauthorized VM, you only get unreadable data. Only the virtual machine that manages the VMDK disks owns the key used to encrypt. vmx and swap files making stored data unreadable. To improve security in a virtual environment, VMware vSphere 6.5 provides the virtual machines encryption capability securing VMDK virtual disks.