Skip to content

VMware vSphere 8.0 ESXi Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000021-VMM-000050

    Group
  • SRG-OS-000023-VMM-000060

    Group
  • SRG-OS-000027-VMM-000080

    Group
  • The ESXi host must enable lockdown mode.

    Enabling Lockdown Mode disables direct access to an ESXi host, requiring the host to be managed remotely from vCenter Server. This is done to ensure the roles and access controls implemented in vCe...
    Rule Medium Severity
  • SRG-OS-000029-VMM-000100

    Group
  • The ESXi host client must be configured with an idle session timeout.

    The ESXi host client is the UI served up by the host itself, outside of vCenter. It is accessed at https://<ESX FQDN>/ui. ESXi is not usually administered via this interface for long periods, and a...
    Rule Medium Severity
  • SRG-OS-000033-VMM-000140

    Group
  • The ESXi host Secure Shell (SSH) daemon must use FIPS 140-2 validated cryptographic modules to protect the confidentiality of remote access sessions.

    Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session. OpenSSH on the ESXi host ships with a FIPS 140-2 valid...
    Rule High Severity
  • SRG-OS-000037-VMM-000150

    Group
  • SRG-OS-000069-VMM-000360

    Group
  • SRG-OS-000077-VMM-000440

    Group
  • The ESXi host must prohibit password reuse for a minimum of five generations.

    If a user or root used the same password continuously or was allowed to change it back shortly after being forced to change it to something else, it would provide a potential intruder with the oppo...
    Rule Medium Severity
  • SRG-OS-000095-VMM-000480

    Group
  • The ESXi host must be configured to disable nonessential capabilities by disabling the Managed Object Browser (MOB).

    The MOB provides a way to explore the object model used by the VMkernel to manage the host and enables configurations to be changed. This interface is meant to be used primarily for debugging the v...
    Rule Medium Severity
  • SRG-OS-000104-VMM-000500

    Group
  • The ESXi host must uniquely identify and must authenticate organizational users by using Active Directory.

    Join ESXi hosts to an Active Directory domain to eliminate the need to create and maintain multiple local user accounts. Using Active Directory for user authentication simplifies the ESXi host conf...
    Rule Low Severity
  • SRG-OS-000107-VMM-000530

    Group
  • The ESXi host Secure Shell (SSH) daemon must ignore .rhosts files.

    SSH trust relationships mean a compromise on one host can allow an attacker to move trivially to other hosts. SSH can emulate the behavior of the obsolete "rsh" command in allowing users to enable ...
    Rule Medium Severity
  • SRG-OS-000163-VMM-000700

    Group
  • SRG-OS-000257-VMM-000910

    Group
  • The ESXi host must implement Secure Boot enforcement.

    Secure Boot is part of the UEFI firmware standard. With UEFI Secure Boot enabled, a host refuses to load any UEFI driver or app unless the operating system bootloader has a valid digital signature....
    Rule Medium Severity
  • SRG-OS-000278-VMM-001000

    Group
  • The ESXi host must enable Secure Boot.

    Secure Boot is part of the Unified Extensible Firmware Interface (UEFI) firmware standard. With UEFI Secure Boot enabled, a host refuses to load any UEFI driver or app unless the operating system b...
    Rule Medium Severity
  • SRG-OS-000329-VMM-001180

    Group
  • The ESXi host must enforce an unlock timeout of 15 minutes after a user account is locked out.

    By enforcing a reasonable unlock timeout after multiple failed logon attempts, the risk of unauthorized access via user password guessing, otherwise known as brute forcing, is reduced. Users must w...
    Rule Medium Severity
  • SRG-OS-000341-VMM-001220

    Group
  • SRG-OS-000342-VMM-001230

    Group
  • SRG-OS-000355-VMM-001330

    Group
  • The ESXi host must synchronize internal information system clocks to an authoritative time source.

    To ensure the accuracy of the system clock, it must be synchronized with an authoritative time source within DOD. Many system functions, including time-based logon and activity restrictions, automa...
    Rule Medium Severity
  • SRG-OS-000366-VMM-001430

    Group
  • SRG-OS-000379-VMM-001550

    Group
  • The ESXi host must enable bidirectional Challenge-Handshake Authentication Protocol (CHAP) authentication for Internet Small Computer Systems Interface (iSCSI) traffic.

    When enabled, vSphere performs bidirectional authentication of both the iSCSI target and host. When not authenticating both the iSCSI target and host, there is potential for a man-in-the-middle att...
    Rule Medium Severity
  • SRG-OS-000423-VMM-001700

    Group
  • The ESXi host must protect the confidentiality and integrity of transmitted information by isolating vMotion traffic.

    While encrypted vMotion is available, vMotion traffic should still be sequestered from other traffic to further protect it from attack. This network must only be accessible to other ESXi hosts, pre...
    Rule Medium Severity
  • SRG-OS-000425-VMM-001710

    Group
  • SRG-OS-000478-VMM-001980

    Group
  • The ESXi host Secure Shell (SSH) daemon must be configured to only use FIPS 140-2 validated ciphers.

    Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. ESXi must implement cryptographic modules adhering to the higher standards approved by...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    Group
  • The ESXi host DCUI.Access list must be verified.

    Lockdown mode disables direct host access, requiring that administrators manage hosts from vCenter Server. However, if a host becomes isolated from vCenter, the administrator is locked out and can ...
    Rule Medium Severity
  • SRG-OS-000023-VMM-000060

    Group
  • SRG-OS-000023-VMM-000060

    Group
  • The ESXi host Secure Shell (SSH) daemon must display the Standard Mandatory DOD Notice and Consent Banner before granting access to the system.

    Display of a standardized and approved use notification before granting access to the host ensures privacy and security notification verbiage used is consistent with applicable federal laws, Execut...
    Rule Medium Severity
  • SRG-OS-000095-VMM-000480

    Group
  • SRG-OS-000095-VMM-000480

    Group
  • The ESXi host must be configured to disable nonessential capabilities by disabling the ESXi shell.

    The ESXi Shell is an interactive command line environment available locally from the Direct Console User Interface (DCUI) or remotely via SSH. Activities performed from the ESXi Shell bypass vCente...
    Rule Medium Severity
  • SRG-OS-000163-VMM-000700

    Group
  • The ESXi host must automatically stop shell services after 10 minutes.

    When the ESXi Shell or Secure Shell (SSH) services are enabled on a host, they will run indefinitely. To avoid having these services left running, set the "ESXiShellTimeOut". The "ESXiShellTimeOut"...
    Rule Medium Severity
  • SRG-OS-000163-VMM-000700

    Group
  • The ESXi host must set a timeout to automatically end idle DCUI sessions after 10 minutes.

    When the Direct Console User Interface (DCUI) is enabled and logged in, it should be automatically logged out if left logged on to avoid access by unauthorized persons. The "DcuiTimeOut" setting de...
    Rule Medium Severity
  • SRG-OS-000423-VMM-001700

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules