Skip to content

VMware vSphere 8.0 ESXi Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000021-VMM-000050

    Group
  • The ESXi host must enforce the limit of three consecutive invalid logon attempts by a user.

    By limiting the number of failed logon attempts, the risk of unauthorized access via user password guessing, otherwise known as brute forcing, is reduced. Once the configured number of attempts is ...
    Rule Medium Severity
  • SRG-OS-000023-VMM-000060

    Group
  • SRG-OS-000027-VMM-000080

    Group
  • The ESXi host must enable lockdown mode.

    Enabling Lockdown Mode disables direct access to an ESXi host, requiring the host to be managed remotely from vCenter Server. This is done to ensure the roles and access controls implemented in vCe...
    Rule Medium Severity
  • SRG-OS-000029-VMM-000100

    Group
  • The ESXi host client must be configured with an idle session timeout.

    The ESXi host client is the UI served up by the host itself, outside of vCenter. It is accessed at https://<ESX FQDN>/ui. ESXi is not usually administered via this interface for long periods, and a...
    Rule Medium Severity
  • SRG-OS-000033-VMM-000140

    Group
  • The ESXi host Secure Shell (SSH) daemon must use FIPS 140-2 validated cryptographic modules to protect the confidentiality of remote access sessions.

    Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session. OpenSSH on the ESXi host ships with a FIPS 140-2 valid...
    Rule High Severity
  • SRG-OS-000037-VMM-000150

    Group
  • The ESXi must produce audit records containing information to establish what type of events occurred.

    Without establishing what types of events occurred, it would be difficult to establish, correlate, and investigate the events leading up to an outage or attack. Satisfies: SRG-OS-000037-VMM-00015...
    Rule Medium Severity
  • SRG-OS-000069-VMM-000360

    Group
  • SRG-OS-000077-VMM-000440

    Group
  • The ESXi host must prohibit password reuse for a minimum of five generations.

    If a user or root used the same password continuously or was allowed to change it back shortly after being forced to change it to something else, it would provide a potential intruder with the oppo...
    Rule Medium Severity
  • SRG-OS-000095-VMM-000480

    Group
  • The ESXi host must be configured to disable nonessential capabilities by disabling the Managed Object Browser (MOB).

    The MOB provides a way to explore the object model used by the VMkernel to manage the host and enables configurations to be changed. This interface is meant to be used primarily for debugging the v...
    Rule Medium Severity
  • SRG-OS-000104-VMM-000500

    Group
  • SRG-OS-000107-VMM-000530

    Group
  • The ESXi host Secure Shell (SSH) daemon must ignore .rhosts files.

    SSH trust relationships mean a compromise on one host can allow an attacker to move trivially to other hosts. SSH can emulate the behavior of the obsolete "rsh" command in allowing users to enable ...
    Rule Medium Severity
  • SRG-OS-000163-VMM-000700

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules