Skip to content

VMware vSphere 8.0 ESXi Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000077-VMM-000440

    Group
  • The ESXi host must prohibit password reuse for a minimum of five generations.

    If a user or root used the same password continuously or was allowed to change it back shortly after being forced to change it to something else, it would provide a potential intruder with the oppo...
    Rule Medium Severity
  • SRG-OS-000095-VMM-000480

    Group
  • The ESXi host must be configured to disable nonessential capabilities by disabling the Managed Object Browser (MOB).

    The MOB provides a way to explore the object model used by the VMkernel to manage the host and enables configurations to be changed. This interface is meant to be used primarily for debugging the v...
    Rule Medium Severity
  • SRG-OS-000104-VMM-000500

    Group
  • The ESXi host must uniquely identify and must authenticate organizational users by using Active Directory.

    Join ESXi hosts to an Active Directory domain to eliminate the need to create and maintain multiple local user accounts. Using Active Directory for user authentication simplifies the ESXi host conf...
    Rule Low Severity
  • SRG-OS-000107-VMM-000530

    Group
  • The ESXi host Secure Shell (SSH) daemon must ignore .rhosts files.

    SSH trust relationships mean a compromise on one host can allow an attacker to move trivially to other hosts. SSH can emulate the behavior of the obsolete "rsh" command in allowing users to enable ...
    Rule Medium Severity
  • SRG-OS-000163-VMM-000700

    Group
  • SRG-OS-000257-VMM-000910

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules