VMware vSphere 8.0 ESXi Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The ESXi host must display the Standard Mandatory DOD Notice and Consent Banner before granting access to the system via Secure Shell (SSH).
Display of a standardized and approved use notification before granting access to the host ensures privacy and security notification verbiage used is consistent with applicable federal laws, Execut...Rule Medium Severity -
SRG-OS-000023-VMM-000060
Group -
The ESXi host Secure Shell (SSH) daemon must display the Standard Mandatory DOD Notice and Consent Banner before granting access to the system.
Display of a standardized and approved use notification before granting access to the host ensures privacy and security notification verbiage used is consistent with applicable federal laws, Execut...Rule Medium Severity -
SRG-OS-000095-VMM-000480
Group -
The ESXi host must be configured to disable nonessential capabilities by disabling Secure Shell (SSH).
The ESXi Shell is an interactive command line interface (CLI) available at the ESXi server console. The ESXi shell provides temporary access to commands essential for server maintenance. Intended p...Rule Medium Severity -
SRG-OS-000095-VMM-000480
Group -
SRG-OS-000163-VMM-000700
Group -
The ESXi host must automatically stop shell services after 10 minutes.
When the ESXi Shell or Secure Shell (SSH) services are enabled on a host, they will run indefinitely. To avoid having these services left running, set the "ESXiShellTimeOut". The "ESXiShellTimeOut"...Rule Medium Severity -
SRG-OS-000163-VMM-000700
Group -
The ESXi host must set a timeout to automatically end idle DCUI sessions after 10 minutes.
When the Direct Console User Interface (DCUI) is enabled and logged in, it should be automatically logged out if left logged on to avoid access by unauthorized persons. The "DcuiTimeOut" setting de...Rule Medium Severity -
SRG-OS-000423-VMM-001700
Group -
SRG-OS-000423-VMM-001700
Group -
The ESXi host must protect the confidentiality and integrity of transmitted information by isolating IP-based storage traffic.
Virtual machines (VMs) might share virtual switches and VLANs with the IP-based storage configurations. IP-based storage includes vSAN, iSCSI, and NFS. This configuration might expose IP-based stor...Rule Medium Severity -
SRG-OS-000480-VMM-002000
Group -
SRG-OS-000480-VMM-002000
Group -
SRG-OS-000480-VMM-002000
Group -
The ESXi host Secure Shell (SSH) daemon must not permit user environment settings.
SSH environment options potentially allow users to bypass access restriction in some configurations. Users must not be able to present environment options to the SSH daemon.Rule Medium Severity -
SRG-OS-000480-VMM-002000
Group -
SRG-OS-000480-VMM-002000
Group -
The ESXi host Secure Shell (SSH) daemon must not permit tunnels.
OpenSSH has the ability to create network tunnels (layer 2 and layer 3) over an SSH connection. This function can provide similar convenience to a virtual private network (VPN) with the similar ris...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.