Skip to content

VMware vSphere 7.0 ESXi Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The ESXi host must configure NTP time synchronization.

    To ensure the accuracy of the system clock, it must be synchronized with an authoritative time source within DOD. Many system functions, including time-based logon and activity restrictions, automa...
    Rule Medium Severity
  • The ESXi host must enable Bridge Protocol Data Units (BPDU) filter on the host to prevent being locked out of physical switch ports with Portfast and BPDU Guard enabled.

    BPDU Guard and Portfast are commonly enabled on the physical switch to which the ESXi host is directly connected to reduce the Spanning Tree Protocol (STP) convergence delay. If a BPDU packet is s...
    Rule Medium Severity
  • All port groups on standard switches must be configured to a value other than that of the native virtual local area network (VLAN).

    ESXi does not use the concept of native VLAN. Frames with a VLAN specified in the port group will have a tag, but frames with VLAN not specified in the port group are not tagged and therefore will ...
    Rule Medium Severity
  • All port groups on standard switches must not be configured to virtual local area network (VLAN) values reserved by upstream physical switches.

    Certain physical switches reserve certain VLAN IDs for internal purposes and often disallow traffic configured to these values. For example, Cisco Catalyst switches typically reserve VLANs 1001 to ...
    Rule Medium Severity
  • The ESXi host must exclusively enable Transport Layer Security (TLS) 1.2 for all endpoints.

    TLS 1.0 and 1.1 are deprecated protocols with well-published shortcomings and vulnerabilities. TLS 1.2 should be enabled on all interfaces and SSLv3, TL 1.1, and 1.0 disabled, where supported. Man...
    Rule High Severity
  • The ESXi host OpenSLP service must be disabled.

    OpenSLP implements the Service Location Protocol to help CIM clients discover CIM servers over TCP 427. This service is not widely needed and has had vulnerabilities exposed in the past. To reduce ...
    Rule Medium Severity
  • The ESXi host must enable volatile key destruction.

    By default, pages allocated for virtual machines (VMs), userspace applications, and kernel threads are zeroed out at allocation time. ESXi will always ensure that no nonzero pages are exposed to VM...
    Rule Medium Severity
  • The ESXi host must not be configured to override virtual machine (VM) configurations.

    Each VM on an ESXi host runs in its own "vmx" process. Upon creation, a vmx process will look in two locations for configuration items, the ESXi host itself and the per-vm *.vmx file in the VM stor...
    Rule Medium Severity
  • The ESXi host must not be configured to override virtual machine (VM) logger settings.

    Each VM on an ESXi host runs in its own "vmx" process. Upon creation, a vmx process will look in two locations for configuration items, the ESXi host itself and the per-vm *.vmx file in the VM stor...
    Rule Medium Severity
  • The ESXi host SSH daemon must be configured to only use FIPS 140-2 validated ciphers.

    Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. ESXi must implement cryptographic modules adhering to the higher standards approved by the...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules