VMware vSphere 7.0 ESXi Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-OS-000480-VMM-002000
<GroupDescription></GroupDescription>Group -
The ESXi host must verify the DCUI.Access list.
<VulnDiscussion>Lockdown mode disables direct host access, requiring that administrators manage hosts from vCenter Server. However, if a host...Rule Medium Severity -
SRG-OS-000480-VMM-002000
<GroupDescription></GroupDescription>Group -
The ESXi host must verify the exception users list for lockdown mode.
<VulnDiscussion>While a host is in lockdown mode (strict or normal), only users on the "Exception Users" list are allowed access. These users...Rule Medium Severity -
SRG-OS-000032-VMM-000130
<GroupDescription></GroupDescription>Group -
Remote logging for ESXi hosts must be configured.
<VulnDiscussion>Remote logging to a central log host provides a secure, centralized store for ESXi logs. By gathering host log files onto a c...Rule Medium Severity -
SRG-OS-000021-VMM-000050
<GroupDescription></GroupDescription>Group -
The ESXi host must enforce the limit of three consecutive invalid logon attempts by a user.
<VulnDiscussion>By limiting the number of failed logon attempts, the risk of unauthorized access via user password guessing, otherwise known ...Rule Medium Severity -
SRG-OS-000329-VMM-001180
<GroupDescription></GroupDescription>Group -
The ESXi host must enforce an unlock timeout of 15 minutes after a user account is locked out.
<VulnDiscussion>By enforcing a reasonable unlock timeout after multiple failed logon attempts, the risk of unauthorized access via user passw...Rule Medium Severity -
SRG-OS-000023-VMM-000060
<GroupDescription></GroupDescription>Group -
The ESXi host must display the Standard Mandatory DOD Notice and Consent Banner before granting access to the system via the Direct Console User Interface (DCUI).
<VulnDiscussion>Failure to display the DOD logon banner prior to a logon attempt will negate legal proceedings resulting from unauthorized ac...Rule Medium Severity -
SRG-OS-000023-VMM-000060
<GroupDescription></GroupDescription>Group -
The ESXi host must display the Standard Mandatory DOD Notice and Consent Banner before granting access to the system via Secure Shell (SSH).
<VulnDiscussion>Failure to display the DOD logon banner prior to a logon attempt will negate legal proceedings resulting from unauthorized ac...Rule Medium Severity -
SRG-OS-000023-VMM-000060
<GroupDescription></GroupDescription>Group -
The ESXi host SSH daemon must be configured with the DOD logon banner.
<VulnDiscussion>The warning message reinforces policy awareness during the logon process and facilitates possible legal action against attack...Rule Medium Severity -
SRG-OS-000033-VMM-000140
<GroupDescription></GroupDescription>Group -
The ESXi host Secure Shell (SSH) daemon must use FIPS 140-2 validated cryptographic modules to protect the confidentiality of remote access sessions.
<VulnDiscussion>OpenSSH on the ESXi host ships with a FIPS 140-2 validated cryptographic module that is enabled by default. For backward comp...Rule Medium Severity -
SRG-OS-000107-VMM-000530
<GroupDescription></GroupDescription>Group -
The ESXi host Secure Shell (SSH) daemon must ignore ".rhosts" files.
<VulnDiscussion>SSH trust relationships mean a compromise on one host can allow an attacker to move trivially to other hosts. SSH can emulate...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.