Skip to content

VMware vSphere 8.0 vCenter Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000516

    Group
  • The vCenter Server must not configure all port groups to virtual local area network (VLAN) values reserved by upstream physical switches.

    Certain physical switches reserve certain VLAN IDs for internal purposes and often disallow traffic configured to these values. For example, Cisco Catalyst switches typically reserve VLANs 1001 to ...
    Rule Medium Severity
  • SRG-APP-000516

    Group
  • The vCenter Server must configure the "vpxuser" auto-password to be changed every 30 days.

    By default, vCenter will change the "vpxuser" password automatically every 30 days. Ensure this setting meets site policies. If it does not, configure it to meet password aging policies. Note: It ...
    Rule Medium Severity
  • SRG-APP-000516

    Group
  • The vCenter Server must configure the "vpxuser" password to meet length policy.

    The "vpxuser" password default length is 32 characters. Ensure this setting meets site policies; if not, configure to meet password length policies. Longer passwords make brute-force password atta...
    Rule Medium Severity
  • SRG-APP-000516

    Group
  • The vCenter Server must be isolated from the public internet but must still allow for patch notification and delivery.

    vCenter and the embedded Lifecycle Manager system must never have a direct route to the internet. Despite this, updates and patches sourced from VMware on the internet must be delivered in a timely...
    Rule Low Severity
  • SRG-APP-000516

    Group
  • The vCenter Server must use unique service accounts when applications connect to vCenter.

    To not violate nonrepudiation (i.e., deny the authenticity of who is connecting to vCenter), when applications need to connect to vCenter they must use unique service accounts.
    Rule Medium Severity
  • SRG-APP-000516

    Group
  • The vCenter Server must protect the confidentiality and integrity of transmitted information by isolating Internet Protocol (IP)-based storage traffic.

    Virtual machines might share virtual switches and virtual local area networks (VLAN) with the IP-based storage configurations. IP-based storage includes vSAN, Internet Small Computer System Interf...
    Rule Medium Severity
  • SRG-APP-000358

    Group
  • The vCenter server must be configured to send events to a central log server.

    vCenter server generates volumes of security-relevant application-level events. Examples include logins, system reconfigurations, system degradation warnings, and more. To ensure these events are a...
    Rule Medium Severity
  • SRG-APP-000516

    Group
  • The vCenter Server must disable or restrict the connectivity between vSAN Health Check and public Hardware Compatibility List (HCL) by use of an external proxy server.

    The vSAN Health Check is able to download the HCL from VMware to check compliance against the underlying vSAN Cluster hosts. To ensure the vCenter server is not directly downloading content from th...
    Rule Medium Severity
  • SRG-APP-000516

    Group
  • The vCenter Server must configure the vSAN Datastore name to a unique name.

    A vSAN Datastore name by default is "vsanDatastore". If more than one vSAN cluster is present in vCenter, both datastores will have the same name by default, potentially leading to confusion and ma...
    Rule Medium Severity
  • SRG-APP-000516

    Group
  • The vCenter Server must disable Username/Password and Windows Integrated Authentication.

    All forms of authentication other than Common Access Card (CAC) must be disabled. Password authentication can be temporarily reenabled for emergency access to the local Single Sign-On (SSO) account...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules