You can compare security approaches for different types of deployments to help plan security for your own ESX deployment.

The complexity of ESX deployments can vary significantly depending on the size of your company, the way that data and resources are shared with the outside world, whether there are multiple datacenters or only one, and so forth. Inherent in the following deployments are policies for user access, resource sharing, and security level.