Skip to content

VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000004-GPOS-00004

    Group
  • SRG-OS-000021-GPOS-00005

    Group
  • SRG-OS-000023-GPOS-00006

    Group
  • SRG-OS-000027-GPOS-00008

    Group
  • The Photon operating system must limit the number of concurrent sessions to ten for all accounts and/or account types.

    Operating system management includes the ability to control the number of users and user sessions that utilize an operating system. Limiting the number of allowed users and sessions per user is hel...
    Rule Low Severity
  • SRG-OS-000032-GPOS-00013

    Group
  • The Photon operating system must monitor remote access logins.

    Remote access services, such as those providing remote access to network devices and information systems, which lack automated monitoring capabilities, increase risk and make remote user access man...
    Rule Medium Severity
  • SRG-OS-000033-GPOS-00014

    Group
  • The Photon operating system must have the OpenSSL FIPS provider installed to protect the confidentiality of remote access sessions.

    Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session. OpenSSH on the Photon operating system when configured...
    Rule High Severity
  • SRG-OS-000037-GPOS-00015

    Group
  • SRG-OS-000039-GPOS-00017

    Group
  • SRG-OS-000042-GPOS-00020

    Group
  • The Photon operating system must be configured to audit the execution of privileged functions.

    Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external entities that have compromised information system accounts, is a serious and...
    Rule Medium Severity
  • SRG-OS-000046-GPOS-00022

    Group
  • SRG-OS-000057-GPOS-00027

    Group
  • The Photon operating system must protect audit logs from unauthorized access.

    Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confidentiality. Audit information includes all information (e.g., audit recor...
    Rule Medium Severity
  • SRG-OS-000063-GPOS-00032

    Group
  • The Photon operating system must allow only authorized users to configure the auditd service.

    Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel may be able to prevent the auditing of critical events. Misconfigured audi...
    Rule Medium Severity
  • SRG-OS-000064-GPOS-00033

    Group
  • SRG-OS-000069-GPOS-00037

    Group
  • The Photon operating system must enforce password complexity by requiring that at least one uppercase character be used.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...
    Rule Medium Severity
  • SRG-OS-000070-GPOS-00038

    Group
  • The Photon operating system must enforce password complexity by requiring that at least one lowercase character be used.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...
    Rule Medium Severity
  • SRG-OS-000071-GPOS-00039

    Group
  • The Photon operating system must enforce password complexity by requiring that at least one numeric character be used.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...
    Rule Medium Severity
  • SRG-OS-000072-GPOS-00040

    Group
  • The Photon operating system must require the change of at least eight characters when passwords are changed.

    If the operating system allows the user to consecutively reuse extensive portions of passwords, this increases the chances of password compromise by increasing the window of opportunity for attemp...
    Rule Medium Severity
  • SRG-OS-000073-GPOS-00041

    Group
  • SRG-OS-000074-GPOS-00042

    Group
  • The Photon operating system must not have the telnet package installed.

    Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily c...
    Rule High Severity
  • SRG-OS-000075-GPOS-00043

    Group
  • The Photon operating system must enforce one day as the minimum password lifetime.

    Enforcing a minimum password lifetime helps to prevent repeated password changes to defeat the password reuse or history enforcement requirement. If users are allowed to immediately and continually...
    Rule Medium Severity
  • SRG-OS-000076-GPOS-00044

    Group
  • The Photon operating systems must enforce a 90-day maximum password lifetime restriction.

    Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the operating system does not limit the lifetime of passwords and force user...
    Rule Medium Severity
  • SRG-OS-000077-GPOS-00045

    Group
  • The Photon operating system must prohibit password reuse for a minimum of five generations.

    Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. If the information system or application allows the user...
    Rule Medium Severity
  • SRG-OS-000078-GPOS-00046

    Group
  • The Photon operating system must enforce a minimum 15-character password length.

    The shorter the password, the lower the number of possible combinations that need to be tested before the password is compromised. Password complexity, or strength, is a measure of the effectivene...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • SRG-OS-000095-GPOS-00049

    Group
  • The Photon operating system must disable unnecessary kernel modules.

    It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessary capabilities or services are often overlooke...
    Rule Medium Severity
  • SRG-OS-000104-GPOS-00051

    Group
  • The Photon operating system must not have duplicate User IDs (UIDs).

    To ensure accountability and prevent unauthenticated access, organizational users must be uniquely identified and authenticated to prevent potential misuse and provide for nonrepudiation.
    Rule Medium Severity
  • SRG-OS-000120-GPOS-00061

    Group
  • SRG-OS-000138-GPOS-00069

    Group
  • The Photon operating system must restrict access to the kernel message buffer.

    Restricting access to the kernel message buffer limits access only to root. This prevents attackers from gaining additional system information as a nonprivileged user.
    Rule Medium Severity
  • SRG-OS-000142-GPOS-00071

    Group
  • The Photon operating system must be configured to use TCP syncookies.

    A TCP SYN flood attack can cause a Denial of Service (DOS) by filling a system's TCP connection table with connections in the SYN_RCVD state. Syncookies can be used to track a connection when a sub...
    Rule Medium Severity
  • SRG-OS-000163-GPOS-00072

    Group
  • The Photon operating system must terminate idle Secure Shell (SSH) sessions after 15 minutes.

    Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or console port th...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules