Skip to content

VMware NSX 4.x Manager NDM Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000027-NDM-000209

    Group
  • SRG-APP-000033-NDM-000212

    Group
  • The NSX Manager must assign users/accounts to organization-defined roles configured with approved authorizations.

    The lack of authorization-based access control could result in the immediate compromise and unauthorized access to sensitive information. Users must be assigned to roles which are configured with a...
    Rule High Severity
  • SRG-APP-000065-NDM-000214

    Group
  • The NSX Manager must be configured to enforce the limit of three consecutive invalid logon attempts, after which time it must block any login attempt for 15 minutes.

    By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced.
    Rule Medium Severity
  • SRG-APP-000068-NDM-000215

    Group
  • The NSX Manager must display the Standard Mandatory DOD Notice and Consent Banner before granting access.

    Display of the DOD-approved use notification before granting access to the network device ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executi...
    Rule Medium Severity
  • SRG-APP-000069-NDM-000216

    Group
  • SRG-APP-000080-NDM-000220

    Group
  • SRG-APP-000148-NDM-000346

    Group
  • SRG-APP-000156-NDM-000250

    Group
  • The NSX Manager must only enable TLS 1.2 or greater.

    A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authenticator and the application validating the user credentials must not be ...
    Rule High Severity
  • SRG-APP-000164-NDM-000252

    Group
  • The NSX Manager must enforce a minimum 15-character password length for local accounts.

    Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password length is one factor of several that helps to d...
    Rule Medium Severity
  • SRG-APP-000166-NDM-000254

    Group
  • The NSX Manager must enforce password complexity by requiring that at least one uppercase character be used for local accounts.

    Use of a complex passwords helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisti...
    Rule Medium Severity
  • SRG-APP-000167-NDM-000255

    Group
  • SRG-APP-000168-NDM-000256

    Group
  • The NSX Manager must enforce password complexity by requiring that at least one numeric character be used for local accounts.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...
    Rule Medium Severity
  • SRG-APP-000169-NDM-000257

    Group
  • SRG-APP-000170-NDM-000329

    Group
  • The NSX Manager must require that when a password is changed, the characters are changed in at least eight of the positions within the password.

    If the application allows the user to consecutively reuse extensive portions of passwords, this increases the chances of password compromise by increasing the window of opportunity for attempts at ...
    Rule Medium Severity
  • SRG-APP-000190-NDM-000267

    Group
  • SRG-APP-000373-NDM-000298

    Group
  • The NSX Manager must be configured to synchronize internal information system clocks using redundant authoritative time sources.

    The loss of connectivity to a particular authoritative time source will result in the loss of time synchronization (free-run mode) and increasingly inaccurate time stamps on audit events and other ...
    Rule Medium Severity
  • SRG-APP-000374-NDM-000299

    Group
  • The NSX Manager must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC).

    If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analysis. Time stamps generated by the application include date and time. Tim...
    Rule Medium Severity
  • SRG-APP-000435-NDM-000315

    Group
  • The NSX Manager must be configured to protect against denial-of-service (DoS) attacks by limit the number of concurrent sessions to an organization-defined number.

    DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded capacity. Limiting the...
    Rule Medium Severity
  • SRG-APP-000515-NDM-000325

    Group
  • The NSX Manager must be configured to send logs to a central log server.

    Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity. Sa...
    Rule High Severity
  • SRG-APP-000516-NDM-000317

    Group
  • SRG-APP-000516-NDM-000341

    Group
  • SRG-APP-000516-NDM-000344

    Group
  • The NSX Manager must obtain its public key certificates from an appropriate certificate policy through an approved service provider.

    For user certificates, each organization obtains certificates from an approved, shared service provider, as required by Office of Management and Budget (OMB) policy. For federal agencies operating ...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000351

    Group
  • The NSX Manager must be running a release that is currently supported by the vendor.

    Network devices running an unsupported operating system lack current security fixes required to mitigate the risks associated with recent vulnerabilities.
    Rule High Severity
  • SRG-APP-000516-NDM-000317

    Group
  • The NSX Manager must disable SSH.

    The NSX shell provides temporary access to commands essential for server maintenance. Intended primarily for use in break-fix scenarios, the NSX shell is well suited for checking and modifying conf...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000317

    Group
  • The NSX Manager must disable SNMP v2.

    SNMPv3 supports commercial-grade security, including authentication, authorization, access control, and privacy. Previous versions of the protocol contained well-known security weaknesses that were...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000317

    Group
  • SRG-APP-000435-NDM-000315

    Group
  • The NSX Manager must be configured as a cluster.

    Failure in a known state can address safety or security in accordance with the mission needs of the organization. Failure to a known secure state helps prevent a loss of confidentiality, integrity,...
    Rule Medium Severity
  • SRG-APP-000435-NDM-000315

    Group
  • The NSX Manager must configure logging levels for services to ensure audit records are generated.

    Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or...
    Rule Medium Severity
  • The NSX Manager must retain the Standard Mandatory DOD Notice and Consent Banner on the screen until the administrator acknowledges the usage conditions and takes explicit actions to log on for further access.

    The banner must be acknowledged by the administrator prior to the device allowing the administrator access to the network device. This provides assurance that the administrator has seen the message...
    Rule Medium Severity
  • The NSX Manager must be configured to integrate with an identity provider that supports multifactor authentication (MFA).

    Common attacks against single-factor authentication are attacks on user passwords. These attacks include brute force password guessing, password spraying, and password credential stuffing. This req...
    Rule High Severity
  • The NSX Manager must be configured with only one local account to be used as the account of last resort in the event the authentication server is unavailable.

    Authentication for administrative (privileged level) access to the device is required at all times. An account can be created on the device's local database for use when the authentication server i...
    Rule Medium Severity
  • The NSX Manager must enforce password complexity by requiring that at least one lowercase character be used for local accounts.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules