Skip to content

VMware vSphere 7.0 ESXi Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000480-VMM-002000

    Group
  • All port groups on standard switches must be configured to reject forged transmits.

    If the virtual machine (VM) operating system changes the Media Access Control (MAC) address, the operating system can send frames with an impersonated source MAC address at any time. This allows an...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    Group
  • All port groups on standard switches must be configured to reject guest Media Access Control (MAC) address changes.

    If the virtual machine (VM) operating system changes the MAC address, it can send frames with an impersonated source MAC address at any time. This allows it to stage malicious attacks on the device...
    Rule High Severity
  • SRG-OS-000480-VMM-002000

    Group
  • All port groups on standard switches must be configured to reject guest promiscuous mode requests.

    When promiscuous mode is enabled for a virtual switch, all virtual machines (VMs) connected to the Portgroup have the potential to read all packets across that network (only the virtual machines co...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    Group
  • Use of the dvFilter network application programming interfaces (APIs) must be restricted.

    If the organization is not using products that use the dvfilter network API, the host should not be configured to send network information to a virtual machine (VM). If the API is enabled, an atta...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    Group
  • SRG-OS-000480-VMM-002000

    Group
  • All port groups on standard switches must not be configured to virtual local area network (VLAN) 4095 unless Virtual Guest Tagging (VGT) is required.

    When a port group is set to VLAN 4095, the vSwitch passes all network frames to the attached virtual machines (VMs) without modifying the VLAN tags. In vSphere, this is referred to as VGT. The VM m...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    Group
  • SRG-OS-000480-VMM-002000

    Group
  • The ESXi host must not provide root/administrator-level access to Common Information Model (CIM)-based hardware monitoring tools or other third-party applications.

    The CIM system provides an interface that enables hardware-level management from remote applications via a set of standard application programming interfaces (APIs). In environments that implemen...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    Group
  • The ESXi host must have all security patches and updates installed.

    Installing software updates is a fundamental mitigation against the exploitation of publicly known vulnerabilities.
    Rule High Severity
  • SRG-OS-000480-VMM-002000

    Group
  • SRG-OS-000480-VMM-002000

    Group
  • The ESXi host must enable Secure Boot.

    Secure Boot is part of the Unified Extensible Firmware Interface (UEFI) firmware standard. With UEFI Secure Boot enabled, a host refuses to load any UEFI driver or app unless the operating system b...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules