Skip to content

VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000004-GPOS-00004

    Group
  • SRG-OS-000021-GPOS-00005

    Group
  • The Photon operating system must enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period.

    By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by locking...
    Rule Medium Severity
  • SRG-OS-000023-GPOS-00006

    Group
  • SRG-OS-000027-GPOS-00008

    Group
  • The Photon operating system must limit the number of concurrent sessions to ten for all accounts and/or account types.

    Operating system management includes the ability to control the number of users and user sessions that utilize an operating system. Limiting the number of allowed users and sessions per user is hel...
    Rule Low Severity
  • SRG-OS-000032-GPOS-00013

    Group
  • The Photon operating system must monitor remote access logins.

    Remote access services, such as those providing remote access to network devices and information systems, which lack automated monitoring capabilities, increase risk and make remote user access man...
    Rule Medium Severity
  • SRG-OS-000033-GPOS-00014

    Group
  • SRG-OS-000037-GPOS-00015

    Group
  • The Photon operating system must configure auditd to log to disk.

    Without establishing what type of events occurred, it would be difficult to establish, correlate, and investigate the events leading up to an outage or attack. Audit record content must be shipped...
    Rule Medium Severity
  • SRG-OS-000039-GPOS-00017

    Group
  • The Photon operating system must enable the auditd service.

    Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. To that en...
    Rule Medium Severity
  • SRG-OS-000042-GPOS-00020

    Group
  • The Photon operating system must be configured to audit the execution of privileged functions.

    Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external entities that have compromised information system accounts, is a serious and...
    Rule Medium Severity
  • SRG-OS-000046-GPOS-00022

    Group
  • SRG-OS-000057-GPOS-00027

    Group
  • The Photon operating system must protect audit logs from unauthorized access.

    Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confidentiality. Audit information includes all information (e.g., audit recor...
    Rule Medium Severity
  • SRG-OS-000063-GPOS-00032

    Group
  • SRG-OS-000064-GPOS-00033

    Group
  • The Photon operating system must generate audit records when successful/unsuccessful attempts to access privileges occur.

    The changing of file permissions could indicate that a user is attempting to gain access to information that would otherwise be disallowed. Auditing DAC modifications can facilitate the identificat...
    Rule Medium Severity
  • SRG-OS-000069-GPOS-00037

    Group
  • SRG-OS-000070-GPOS-00038

    Group
  • The Photon operating system must enforce password complexity by requiring that at least one lowercase character be used.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...
    Rule Medium Severity
  • SRG-OS-000071-GPOS-00039

    Group
  • The Photon operating system must enforce password complexity by requiring that at least one numeric character be used.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...
    Rule Medium Severity
  • SRG-OS-000072-GPOS-00040

    Group
  • SRG-OS-000073-GPOS-00041

    Group
  • The operating system must store only encrypted representations of passwords.

    Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily c...
    Rule High Severity
  • SRG-OS-000074-GPOS-00042

    Group
  • The Photon operating system must not have the telnet package installed.

    Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily c...
    Rule High Severity
  • SRG-OS-000075-GPOS-00043

    Group
  • The Photon operating system must enforce one day as the minimum password lifetime.

    Enforcing a minimum password lifetime helps to prevent repeated password changes to defeat the password reuse or history enforcement requirement. If users are allowed to immediately and continually...
    Rule Medium Severity
  • SRG-OS-000076-GPOS-00044

    Group
  • The Photon operating systems must enforce a 90-day maximum password lifetime restriction.

    Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the operating system does not limit the lifetime of passwords and force user...
    Rule Medium Severity
  • SRG-OS-000077-GPOS-00045

    Group
  • The Photon operating system must prohibit password reuse for a minimum of five generations.

    Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. If the information system or application allows the user...
    Rule Medium Severity
  • SRG-OS-000078-GPOS-00046

    Group
  • SRG-OS-000080-GPOS-00048

    Group
  • The Photon operating system must require authentication upon booting into single-user and maintenance modes.

    If the system does not require authentication before it boots into single-user mode, anyone with console access to the system can trivially access all files on the system. GRUB2 is the boot loader ...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    Group
  • The Photon operating system must disable unnecessary kernel modules.

    It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessary capabilities or services are often overlooke...
    Rule Medium Severity
  • SRG-OS-000104-GPOS-00051

    Group
  • The Photon operating system must not have duplicate User IDs (UIDs).

    To ensure accountability and prevent unauthenticated access, organizational users must be uniquely identified and authenticated to prevent potential misuse and provide for nonrepudiation.
    Rule Medium Severity
  • SRG-OS-000120-GPOS-00061

    Group
  • SRG-OS-000138-GPOS-00069

    Group
  • SRG-OS-000142-GPOS-00071

    Group
  • SRG-OS-000163-GPOS-00072

    Group
  • The Photon operating system must terminate idle Secure Shell (SSH) sessions after 15 minutes.

    Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or console port th...
    Rule Medium Severity
  • SRG-OS-000205-GPOS-00083

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules