VMware vSphere 8.0 ESXi Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The ESXi host must enforce password complexity by configuring a password quality policy.
To enforce the use of complex passwords, minimum numbers of characters of different classes are mandated. The use of complex passwords reduces the ability of attackers to successfully obtain valid...Rule Medium Severity -
The ESXi host must uniquely identify and must authenticate organizational users by using Active Directory.
Join ESXi hosts to an Active Directory domain to eliminate the need to create and maintain multiple local user accounts. Using Active Directory for user authentication simplifies the ESXi host conf...Rule Low Severity -
The ESXi host must implement Secure Boot enforcement.
Secure Boot is part of the UEFI firmware standard. With UEFI Secure Boot enabled, a host refuses to load any UEFI driver or app unless the operating system bootloader has a valid digital signature....Rule Medium Severity -
The ESXi host must synchronize internal information system clocks to an authoritative time source.
To ensure the accuracy of the system clock, it must be synchronized with an authoritative time source within DOD. Many system functions, including time-based logon and activity restrictions, automa...Rule Medium Severity -
The ESXi host must protect the confidentiality and integrity of transmitted information by isolating vMotion traffic.
While encrypted vMotion is available, vMotion traffic should still be sequestered from other traffic to further protect it from attack. This network must only be accessible to other ESXi hosts, pre...Rule Medium Severity -
The ESXi host DCUI.Access list must be verified.
Lockdown mode disables direct host access, requiring that administrators manage hosts from vCenter Server. However, if a host becomes isolated from vCenter, the administrator is locked out and can ...Rule Medium Severity -
The ESXi host must be configured to disable nonessential capabilities by disabling the ESXi shell.
The ESXi Shell is an interactive command line environment available locally from the Direct Console User Interface (DCUI) or remotely via SSH. Activities performed from the ESXi Shell bypass vCente...Rule Medium Severity -
The ESXi host must protect the confidentiality and integrity of transmitted information by isolating ESXi management traffic.
The vSphere management network provides access to the vSphere management interface on each component. Services running on the management interface provide an opportunity for an attacker to gain pri...Rule Medium Severity -
The ESXi host lockdown mode exception users list must be verified.
While a host is in lockdown mode (strict or normal), only users on the "Exception Users" list are allowed access. These users do not lose their permissions when the host enters lockdown mode. The...Rule Medium Severity -
The ESXi host Secure Shell (SSH) daemon must not allow host-based authentication.
SSH trust relationships mean a compromise on one host can allow an attacker to move trivially to other hosts. SSH's cryptographic host-based authentication is more secure than ".rhosts" authenticat...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.