VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-OS-000004-GPOS-00004
Group -
SRG-OS-000021-GPOS-00005
Group -
SRG-OS-000023-GPOS-00006
Group -
SRG-OS-000027-GPOS-00008
Group -
The Photon operating system must limit the number of concurrent sessions to ten for all accounts and/or account types.
Operating system management includes the ability to control the number of users and user sessions that utilize an operating system. Limiting the number of allowed users and sessions per user is hel...Rule Low Severity -
SRG-OS-000032-GPOS-00013
Group -
The Photon operating system must monitor remote access logins.
Remote access services, such as those providing remote access to network devices and information systems, which lack automated monitoring capabilities, increase risk and make remote user access man...Rule Medium Severity -
SRG-OS-000033-GPOS-00014
Group -
The Photon operating system must have the OpenSSL FIPS provider installed to protect the confidentiality of remote access sessions.
Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session. OpenSSH on the Photon operating system when configured...Rule High Severity -
SRG-OS-000037-GPOS-00015
Group -
SRG-OS-000039-GPOS-00017
Group -
SRG-OS-000042-GPOS-00020
Group -
The Photon operating system must be configured to audit the execution of privileged functions.
Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external entities that have compromised information system accounts, is a serious and...Rule Medium Severity -
SRG-OS-000046-GPOS-00022
Group -
SRG-OS-000057-GPOS-00027
Group -
The Photon operating system must protect audit logs from unauthorized access.
Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confidentiality. Audit information includes all information (e.g., audit recor...Rule Medium Severity -
SRG-OS-000063-GPOS-00032
Group -
The Photon operating system must allow only authorized users to configure the auditd service.
Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel may be able to prevent the auditing of critical events. Misconfigured audi...Rule Medium Severity -
SRG-OS-000064-GPOS-00033
Group -
SRG-OS-000069-GPOS-00037
Group -
The Photon operating system must enforce password complexity by requiring that at least one uppercase character be used.
Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...Rule Medium Severity -
SRG-OS-000070-GPOS-00038
Group -
The Photon operating system must enforce password complexity by requiring that at least one lowercase character be used.
Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...Rule Medium Severity -
SRG-OS-000071-GPOS-00039
Group -
The Photon operating system must enforce password complexity by requiring that at least one numeric character be used.
Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...Rule Medium Severity -
SRG-OS-000072-GPOS-00040
Group -
The Photon operating system must require the change of at least eight characters when passwords are changed.
If the operating system allows the user to consecutively reuse extensive portions of passwords, this increases the chances of password compromise by increasing the window of opportunity for attemp...Rule Medium Severity -
SRG-OS-000073-GPOS-00041
Group -
SRG-OS-000074-GPOS-00042
Group -
The Photon operating system must not have the telnet package installed.
Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily c...Rule High Severity -
SRG-OS-000075-GPOS-00043
Group -
The Photon operating system must enforce one day as the minimum password lifetime.
Enforcing a minimum password lifetime helps to prevent repeated password changes to defeat the password reuse or history enforcement requirement. If users are allowed to immediately and continually...Rule Medium Severity -
SRG-OS-000076-GPOS-00044
Group -
The Photon operating systems must enforce a 90-day maximum password lifetime restriction.
Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the operating system does not limit the lifetime of passwords and force user...Rule Medium Severity -
SRG-OS-000077-GPOS-00045
Group -
The Photon operating system must prohibit password reuse for a minimum of five generations.
Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. If the information system or application allows the user...Rule Medium Severity -
SRG-OS-000078-GPOS-00046
Group -
The Photon operating system must enforce a minimum 15-character password length.
The shorter the password, the lower the number of possible combinations that need to be tested before the password is compromised. Password complexity, or strength, is a measure of the effectivene...Rule Medium Severity -
SRG-OS-000080-GPOS-00048
Group -
SRG-OS-000095-GPOS-00049
Group -
The Photon operating system must disable unnecessary kernel modules.
It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessary capabilities or services are often overlooke...Rule Medium Severity -
SRG-OS-000104-GPOS-00051
Group -
The Photon operating system must not have duplicate User IDs (UIDs).
To ensure accountability and prevent unauthenticated access, organizational users must be uniquely identified and authenticated to prevent potential misuse and provide for nonrepudiation.Rule Medium Severity -
SRG-OS-000120-GPOS-00061
Group -
SRG-OS-000138-GPOS-00069
Group -
The Photon operating system must restrict access to the kernel message buffer.
Restricting access to the kernel message buffer limits access only to root. This prevents attackers from gaining additional system information as a nonprivileged user.Rule Medium Severity -
SRG-OS-000142-GPOS-00071
Group -
The Photon operating system must be configured to use TCP syncookies.
A TCP SYN flood attack can cause a Denial of Service (DOS) by filling a system's TCP connection table with connections in the SYN_RCVD state. Syncookies can be used to track a connection when a sub...Rule Medium Severity -
SRG-OS-000163-GPOS-00072
Group -
The Photon operating system must terminate idle Secure Shell (SSH) sessions after 15 minutes.
Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or console port th...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.