Cloud 101CircleEventsBlog
Gain exclusive access to CSA’s extensive network of cloud security experts by becoming a corporate member. Learn how today.

STAR Registry Listing for

VMware Cloud Flex Storage

Founded in 2013 by the Cloud Security Alliance, the Security Trust Assurance and Risk (STAR) registry encompasses key principles of transparency, rigorous auditing, and cloud security and privacy best practices.

VMware Cloud Flex Storage Logo
VMware Cloud Flex Storage

VMware Cloud Flex Storage

VMware Cloud Flex Storage is built on a mature, enterprise-class filesystem that has been developed and production-hardened over years. It is the same filesystem that has been backing the VMware Cloud Disaster Recovery service. The filesystem has a two-tier design that allows for independent scaling of storage performance and capacity, using a Log-Structure Filesystem (LFS) design. The combination of LFS with a 2-tier design, along with efficient snapshots and immutability, makes this a multi-purpose filesystem that unlocks many use cases, such as backup, disaster recovery, ransomware protection, and recovery. With VMware Cloud Flex Storage, we are extending this proven technology to primary storage and making it available in the public cloud, where it delivers exceptional storage performance, scalability, and cost efficiency for traditional and modern workloads.

View other services by VMware, Inc.:

Organizations who have the CSA Trusted Cloud Provider seal demonstrate a commitment to organizational security. They are a CSA Corporate Member volunteer regularly for CSA, and have at least one staff member who has earned their CCSK.
Information about VMware Cloud Flex Storage
Listed Since: 12/19/2022
Last Updated: 12/19/2022

Level 1: Self-Assessment

At level one organizations can submit one or both of the security and privacy self-assessments. These are based off of the Cloud Controls Matrix and the CSA Code of Conduct for GDPR Compliance.

Security Self-Assessment
Consensus Assessments Initiative Questionnaire v4.0.2
Offers an industry-accepted way to document what security controls exist in IaaS, PaaS, and SaaS services. It provides a set of Yes/No questions a cloud consumer and cloud auditor may wish to ask of a cloud provider to ascertain their compliance to the CSA Cloud Controls Matrix (CCM).