Skip to content

VMware vSphere 7.0 vCenter Appliance Photon OS Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000004-GPOS-00004

    Group
  • The Photon operating system must audit all account creations.

    Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to create an acco...
    Rule Medium Severity
  • SRG-OS-000021-GPOS-00005

    Group
  • SRG-OS-000023-GPOS-00006

    Group
  • The Photon operating system must display the Standard Mandatory DOD Notice and Consent Banner before granting Secure Shell (SSH) access.

    Display of a standardized and approved use notification before granting access to the operating system ensures privacy and security notification verbiage used is consistent with applicable federal ...
    Rule Medium Severity
  • SRG-OS-000027-GPOS-00008

    Group
  • The Photon operating system must limit the number of concurrent sessions to 10 for all accounts and/or account types.

    Operating system management includes the ability to control the number of users and user sessions that utilize an operating system. Limiting the number of allowed users and sessions per user is hel...
    Rule Medium Severity
  • SRG-OS-000029-GPOS-00010

    Group
  • The Photon operating system must set a session inactivity timeout of 15 minutes or less.

    A session timeout is an action taken when a session goes idle for any reason. Rather than relying on the user to manually disconnect their session prior to going idle, the Photon operating system m...
    Rule Medium Severity
  • SRG-OS-000032-GPOS-00013

    Group
  • The Photon operating system must have the sshd SyslogFacility set to "authpriv".

    Automated monitoring of remote access sessions allows organizations to detect cyberattacks and ensure ongoing compliance with remote access policies by auditing connection activities.
    Rule Medium Severity
  • SRG-OS-000032-GPOS-00013

    Group
  • SRG-OS-000032-GPOS-00013

    Group
  • SRG-OS-000033-GPOS-00014

    Group
  • The Photon operating system must configure sshd to use approved encryption algorithms.

    Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session. OpenSSH on the Photon operating system is compiled wit...
    Rule Low Severity
  • SRG-OS-000037-GPOS-00015

    Group
  • The Photon operating system must configure auditd to log to disk.

    Without establishing what type of events occurred, it would be difficult to establish, correlate, and investigate the events leading up to an outage or attack. Audit record content must be shipped...
    Rule Medium Severity
  • SRG-OS-000038-GPOS-00016

    Group
  • The Photon operating system must configure auditd to use the correct log format.

    To compile an accurate risk assessment and provide forensic analysis, it is essential for security personnel to know exact, unfiltered details of the event in question.
    Rule Medium Severity
  • SRG-OS-000042-GPOS-00020

    Group
  • The Photon operating system must be configured to audit the execution of privileged functions.

    Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external entities that have compromised information system accounts, is a serious and...
    Rule Medium Severity
  • SRG-OS-000042-GPOS-00021

    Group
  • SRG-OS-000046-GPOS-00022

    Group
  • SRG-OS-000047-GPOS-00023

    Group
  • The Photon operating system audit log must attempt to log audit failures to syslog.

    It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without this notification, the security personnel may be unaware of an ...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    Group
  • The Photon operating system audit log must have correct permissions.

    Audit information includes all information (e.g., audit records, audit settings, audit reports) needed to successfully audit operating system activity. Unauthorized disclosure of audit records can...
    Rule Medium Severity
  • SRG-OS-000058-GPOS-00028

    Group
  • The Photon operating system audit log must be owned by root.

    Audit information includes all information (e.g., audit records, audit settings, audit reports) needed to successfully audit operating system activity. Unauthorized disclosure of audit records can...
    Rule Medium Severity
  • SRG-OS-000059-GPOS-00029

    Group
  • The Photon operating system audit log must be group-owned by root.

    Audit information includes all information (e.g., audit records, audit settings, audit reports) needed to successfully audit operating system activity. Unauthorized disclosure of audit records can...
    Rule Medium Severity
  • SRG-OS-000063-GPOS-00032

    Group
  • SRG-OS-000064-GPOS-00033

    Group
  • The Photon operating system must generate audit records when successful/unsuccessful attempts to access privileges occur.

    Audit records can be generated from various components within the information system (e.g., module or policy filter). Satisfies: SRG-OS-000064-GPOS-00033, SRG-OS-000392-GPOS-00172, SRG-OS-000462-G...
    Rule Medium Severity
  • SRG-OS-000069-GPOS-00037

    Group
  • The Photon operating system must enforce password complexity by requiring that at least one uppercase character be used.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...
    Rule Medium Severity
  • SRG-OS-000070-GPOS-00038

    Group
  • The Photon operating system must enforce password complexity by requiring that at least one lowercase character be used.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...
    Rule Medium Severity
  • SRG-OS-000071-GPOS-00039

    Group
  • The Photon operating system must enforce password complexity by requiring that at least one numeric character be used.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...
    Rule Medium Severity
  • SRG-OS-000072-GPOS-00040

    Group
  • The Photon operating system must require that new passwords are at least four characters different from the old password.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...
    Rule Medium Severity
  • SRG-OS-000073-GPOS-00041

    Group
  • SRG-OS-000074-GPOS-00042

    Group
  • The Photon operating system must use an OpenSSH server version that does not support protocol 1.

    A replay attack may enable an unauthorized user to gain access to the operating system. Authentication sessions between the authenticator and the operating system validating the user credentials mu...
    Rule Medium Severity
  • SRG-OS-000075-GPOS-00043

    Group
  • The Photon operating system must be configured so that passwords for new users are restricted to a 24-hour minimum lifetime.

    Enforcing a minimum password lifetime helps to prevent repeated password changes to defeat the password reuse or history enforcement requirement. If users are allowed to immediately and continually...
    Rule Medium Severity
  • SRG-OS-000076-GPOS-00044

    Group
  • The Photon operating system must be configured so that passwords for new users are restricted to a 90-day maximum lifetime.

    Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the operating system does not limit the lifetime of passwords and force user...
    Rule Medium Severity
  • SRG-OS-000077-GPOS-00045

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules