Skip to content

VMware vSphere 8.0 ESXi Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000023-VMM-000060

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must display the Standard Mandatory DOD Notice and Consent Banner before granting access to the system via the Direct Console User Interface (DCUI).

    &lt;VulnDiscussion&gt;Display of a standardized and approved use notification before granting access to the host ensures privacy and security notif...
    Rule Medium Severity
  • SRG-OS-000027-VMM-000080

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must enable lockdown mode.

    &lt;VulnDiscussion&gt;Enabling Lockdown Mode disables direct access to an ESXi host, requiring the host to be managed remotely from vCenter Server....
    Rule Medium Severity
  • SRG-OS-000029-VMM-000100

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host client must be configured with an idle session timeout.

    &lt;VulnDiscussion&gt;The ESXi host client is the UI served up by the host itself, outside of vCenter. It is accessed at https://&lt;ESX FQDN&gt;/u...
    Rule Medium Severity
  • SRG-OS-000033-VMM-000140

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host Secure Shell (SSH) daemon must use FIPS 140-2 validated cryptographic modules to protect the confidentiality of remote access sessions.

    &lt;VulnDiscussion&gt;Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...
    Rule High Severity
  • SRG-OS-000037-VMM-000150

    <GroupDescription></GroupDescription>
    Group
  • The ESXi must produce audit records containing information to establish what type of events occurred.

    &lt;VulnDiscussion&gt;Without establishing what types of events occurred, it would be difficult to establish, correlate, and investigate the events...
    Rule Medium Severity
  • SRG-OS-000069-VMM-000360

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must enforce password complexity by configuring a password quality policy.

    &lt;VulnDiscussion&gt;To enforce the use of complex passwords, minimum numbers of characters of different classes are mandated. The use of complex...
    Rule Medium Severity
  • SRG-OS-000077-VMM-000440

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must prohibit password reuse for a minimum of five generations.

    &lt;VulnDiscussion&gt;If a user or root used the same password continuously or was allowed to change it back shortly after being forced to change i...
    Rule Medium Severity
  • SRG-OS-000095-VMM-000480

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must be configured to disable nonessential capabilities by disabling the Managed Object Browser (MOB).

    &lt;VulnDiscussion&gt;The MOB provides a way to explore the object model used by the VMkernel to manage the host and enables configurations to be c...
    Rule Medium Severity
  • SRG-OS-000104-VMM-000500

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must uniquely identify and must authenticate organizational users by using Active Directory.

    &lt;VulnDiscussion&gt;Join ESXi hosts to an Active Directory domain to eliminate the need to create and maintain multiple local user accounts. Usin...
    Rule Low Severity
  • SRG-OS-000107-VMM-000530

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host Secure Shell (SSH) daemon must ignore .rhosts files.

    &lt;VulnDiscussion&gt;SSH trust relationships mean a compromise on one host can allow an attacker to move trivially to other hosts. SSH can emulate...
    Rule Medium Severity
  • SRG-OS-000163-VMM-000700

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must set a timeout to automatically end idle shell sessions after fifteen minutes.

    &lt;VulnDiscussion&gt;If a user forgets to log out of their local or remote ESXi Shell session, the idle connection will remain open indefinitely a...
    Rule Medium Severity
  • SRG-OS-000257-VMM-000910

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must implement Secure Boot enforcement.

    &lt;VulnDiscussion&gt;Secure Boot is part of the UEFI firmware standard. With UEFI Secure Boot enabled, a host refuses to load any UEFI driver or a...
    Rule Medium Severity
  • SRG-OS-000278-VMM-001000

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must enable Secure Boot.

    &lt;VulnDiscussion&gt;Secure Boot is part of the Unified Extensible Firmware Interface (UEFI) firmware standard. With UEFI Secure Boot enabled, a h...
    Rule Medium Severity
  • SRG-OS-000329-VMM-001180

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must enforce an unlock timeout of 15 minutes after a user account is locked out.

    &lt;VulnDiscussion&gt;By enforcing a reasonable unlock timeout after multiple failed logon attempts, the risk of unauthorized access via user passw...
    Rule Medium Severity
  • SRG-OS-000341-VMM-001220

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must allocate audit record storage capacity to store at least one week's worth of audit records.

    &lt;VulnDiscussion&gt;In order to ensure ESXi has sufficient storage capacity in which to write the audit logs, audit record storage capacity shoul...
    Rule Medium Severity
  • SRG-OS-000342-VMM-001230

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must off-load logs via syslog.

    &lt;VulnDiscussion&gt;Remote logging to a central log host provides a secure, centralized store for ESXi logs. By gathering host log files onto a c...
    Rule Medium Severity
  • SRG-OS-000355-VMM-001330

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must synchronize internal information system clocks to an authoritative time source.

    &lt;VulnDiscussion&gt;To ensure the accuracy of the system clock, it must be synchronized with an authoritative time source within DOD. Many system...
    Rule Medium Severity
  • SRG-OS-000366-VMM-001430

    <GroupDescription></GroupDescription>
    Group
  • The ESXi Image Profile and vSphere Installation Bundle (VIB) acceptance level must be verified.

    &lt;VulnDiscussion&gt;Verify the ESXi Image Profile to only allow signed VIBs. An unsigned VIB represents untested code installed on an ESXi host. ...
    Rule High Severity
  • SRG-OS-000379-VMM-001550

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must enable bidirectional Challenge-Handshake Authentication Protocol (CHAP) authentication for Internet Small Computer Systems Interface (iSCSI) traffic.

    &lt;VulnDiscussion&gt;When enabled, vSphere performs bidirectional authentication of both the iSCSI target and host. When not authenticating both t...
    Rule Medium Severity
  • SRG-OS-000423-VMM-001700

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must protect the confidentiality and integrity of transmitted information by isolating vMotion traffic.

    &lt;VulnDiscussion&gt;While encrypted vMotion is available, vMotion traffic should still be sequestered from other traffic to further protect it fr...
    Rule Medium Severity
  • SRG-OS-000425-VMM-001710

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must maintain the confidentiality and integrity of information during transmission by exclusively enabling Transport Layer Security (TLS) 1.2.

    &lt;VulnDiscussion&gt;TLS 1.0 and 1.1 are deprecated protocols with well-published shortcomings and vulnerabilities. TLS 1.2 should be enabled on a...
    Rule High Severity
  • SRG-OS-000478-VMM-001980

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host Secure Shell (SSH) daemon must be configured to only use FIPS 140-2 validated ciphers.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. ESXi must impl...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host DCUI.Access list must be verified.

    &lt;VulnDiscussion&gt;Lockdown mode disables direct host access, requiring that administrators manage hosts from vCenter Server. However, if a host...
    Rule Medium Severity
  • SRG-OS-000023-VMM-000060

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must display the Standard Mandatory DOD Notice and Consent Banner before granting access to the system via Secure Shell (SSH).

    &lt;VulnDiscussion&gt;Display of a standardized and approved use notification before granting access to the host ensures privacy and security notif...
    Rule Medium Severity
  • SRG-OS-000023-VMM-000060

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host Secure Shell (SSH) daemon must display the Standard Mandatory DOD Notice and Consent Banner before granting access to the system.

    &lt;VulnDiscussion&gt;Display of a standardized and approved use notification before granting access to the host ensures privacy and security notif...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules