VMware vSphere 8.0 ESXi Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The ESXi host must implement Secure Boot enforcement.
Secure Boot is part of the UEFI firmware standard. With UEFI Secure Boot enabled, a host refuses to load any UEFI driver or app unless the operating system bootloader has a valid digital signature....Rule Medium Severity -
SRG-OS-000278-VMM-001000
Group -
The ESXi host must enable Secure Boot.
Secure Boot is part of the Unified Extensible Firmware Interface (UEFI) firmware standard. With UEFI Secure Boot enabled, a host refuses to load any UEFI driver or app unless the operating system b...Rule Medium Severity -
SRG-OS-000329-VMM-001180
Group -
The ESXi host must enforce an unlock timeout of 15 minutes after a user account is locked out.
By enforcing a reasonable unlock timeout after multiple failed logon attempts, the risk of unauthorized access via user password guessing, otherwise known as brute forcing, is reduced. Users must w...Rule Medium Severity -
SRG-OS-000341-VMM-001220
Group -
SRG-OS-000342-VMM-001230
Group -
SRG-OS-000355-VMM-001330
Group -
The ESXi host must synchronize internal information system clocks to an authoritative time source.
To ensure the accuracy of the system clock, it must be synchronized with an authoritative time source within DOD. Many system functions, including time-based logon and activity restrictions, automa...Rule Medium Severity -
SRG-OS-000366-VMM-001430
Group -
SRG-OS-000379-VMM-001550
Group -
The ESXi host must enable bidirectional Challenge-Handshake Authentication Protocol (CHAP) authentication for Internet Small Computer Systems Interface (iSCSI) traffic.
When enabled, vSphere performs bidirectional authentication of both the iSCSI target and host. When not authenticating both the iSCSI target and host, there is potential for a man-in-the-middle att...Rule Medium Severity -
SRG-OS-000423-VMM-001700
Group -
The ESXi host must protect the confidentiality and integrity of transmitted information by isolating vMotion traffic.
While encrypted vMotion is available, vMotion traffic should still be sequestered from other traffic to further protect it from attack. This network must only be accessible to other ESXi hosts, pre...Rule Medium Severity -
SRG-OS-000425-VMM-001710
Group -
SRG-OS-000478-VMM-001980
Group -
The ESXi host Secure Shell (SSH) daemon must be configured to only use FIPS 140-2 validated ciphers.
Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. ESXi must implement cryptographic modules adhering to the higher standards approved by...Rule Medium Severity -
SRG-OS-000480-VMM-002000
Group -
The ESXi host DCUI.Access list must be verified.
Lockdown mode disables direct host access, requiring that administrators manage hosts from vCenter Server. However, if a host becomes isolated from vCenter, the administrator is locked out and can ...Rule Medium Severity -
SRG-OS-000023-VMM-000060
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.