Skip to content

VMware vSphere 8.0 ESXi Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000023-VMM-000060

    Group
  • The ESXi host Secure Shell (SSH) daemon must display the Standard Mandatory DOD Notice and Consent Banner before granting access to the system.

    Display of a standardized and approved use notification before granting access to the host ensures privacy and security notification verbiage used is consistent with applicable federal laws, Execut...
    Rule Medium Severity
  • SRG-OS-000095-VMM-000480

    Group
  • SRG-OS-000095-VMM-000480

    Group
  • The ESXi host must be configured to disable nonessential capabilities by disabling the ESXi shell.

    The ESXi Shell is an interactive command line environment available locally from the Direct Console User Interface (DCUI) or remotely via SSH. Activities performed from the ESXi Shell bypass vCente...
    Rule Medium Severity
  • SRG-OS-000163-VMM-000700

    Group
  • The ESXi host must automatically stop shell services after 10 minutes.

    When the ESXi Shell or Secure Shell (SSH) services are enabled on a host, they will run indefinitely. To avoid having these services left running, set the "ESXiShellTimeOut". The "ESXiShellTimeOut"...
    Rule Medium Severity
  • SRG-OS-000163-VMM-000700

    Group
  • The ESXi host must set a timeout to automatically end idle DCUI sessions after 10 minutes.

    When the Direct Console User Interface (DCUI) is enabled and logged in, it should be automatically logged out if left logged on to avoid access by unauthorized persons. The "DcuiTimeOut" setting de...
    Rule Medium Severity
  • SRG-OS-000423-VMM-001700

    Group
  • The ESXi host must protect the confidentiality and integrity of transmitted information by isolating ESXi management traffic.

    The vSphere management network provides access to the vSphere management interface on each component. Services running on the management interface provide an opportunity for an attacker to gain pri...
    Rule Medium Severity
  • SRG-OS-000423-VMM-001700

    Group
  • SRG-OS-000480-VMM-002000

    Group
  • The ESXi host lockdown mode exception users list must be verified.

    While a host is in lockdown mode (strict or normal), only users on the "Exception Users" list are allowed access. These users do not lose their permissions when the host enters lockdown mode. The...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    Group
  • The ESXi host Secure Shell (SSH) daemon must not allow host-based authentication.

    SSH trust relationships mean a compromise on one host can allow an attacker to move trivially to other hosts. SSH's cryptographic host-based authentication is more secure than ".rhosts" authenticat...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    Group
  • The ESXi host Secure Shell (SSH) daemon must not permit user environment settings.

    SSH environment options potentially allow users to bypass access restriction in some configurations. Users must not be able to present environment options to the SSH daemon.
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    Group
  • The ESXi host Secure Shell (SSH) daemon must be configured to not allow gateway ports.

    SSH Transmission Control Protocol (TCP) connection forwarding provides a mechanism to establish TCP connections proxied by the SSH server. This function can provide convenience similar to a virtual...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules