VMware vSphere 7.0 vCenter Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000065
<GroupDescription></GroupDescription>Group -
The vCenter Server must enforce the limit of three consecutive invalid login attempts by a user.
<VulnDiscussion>By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise...Rule Medium Severity -
SRG-APP-000068
<GroupDescription></GroupDescription>Group -
The vCenter Server must display the Standard Mandatory DOD Notice and Consent Banner before login.
<VulnDiscussion>Display of the DOD-approved use notification before granting access to the application ensures privacy and security notificat...Rule Medium Severity -
SRG-APP-000095
<GroupDescription></GroupDescription>Group -
The vCenter Server must produce audit records containing information to establish what type of events occurred.
<VulnDiscussion>Without establishing what types of events occurred, it would be difficult to establish, correlate, and investigate the events...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
vCenter Server plugins must be verified.
<VulnDiscussion>The vCenter Server includes a vSphere Client extensibility framework, which provides the ability to extend the vSphere Client...Rule Medium Severity -
SRG-APP-000148
<GroupDescription></GroupDescription>Group -
The vCenter Server must uniquely identify and authenticate users or processes acting on behalf of users.
<VulnDiscussion>To ensure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to pre...Rule Medium Severity -
SRG-APP-000149
<GroupDescription></GroupDescription>Group -
The vCenter Server must require multifactor authentication.
<VulnDiscussion>Without the use of multifactor authentication, the ease of access to privileged functions is greatly increased. Multifactor...Rule Medium Severity -
SRG-APP-000164
<GroupDescription></GroupDescription>Group -
The vCenter Server passwords must be at least 15 characters in length.
<VulnDiscussion>The shorter the password, the lower the number of possible combinations that need to be tested before the password is comprom...Rule Medium Severity -
SRG-APP-000165
<GroupDescription></GroupDescription>Group -
The vCenter Server must prohibit password reuse for a minimum of five generations.
<VulnDiscussion>Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...Rule Medium Severity -
SRG-APP-000166
<GroupDescription></GroupDescription>Group -
The vCenter Server passwords must contain at least one uppercase character.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Medium Severity -
SRG-APP-000167
<GroupDescription></GroupDescription>Group -
The vCenter Server passwords must contain at least one lowercase character.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Medium Severity -
SRG-APP-000168
<GroupDescription></GroupDescription>Group -
The vCenter Server passwords must contain at least one numeric character.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Medium Severity -
SRG-APP-000169
<GroupDescription></GroupDescription>Group -
The vCenter Server passwords must contain at least one special character.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Medium Severity -
SRG-APP-000172
<GroupDescription></GroupDescription>Group -
The vCenter Server must enable FIPS-validated cryptography.
<VulnDiscussion>FIPS 140-2 is the current standard for validating that mechanisms used to access cryptographic modules use authentication tha...Rule High Severity -
SRG-APP-000174
<GroupDescription></GroupDescription>Group -
The vCenter Server must enforce a 60-day maximum password lifetime restriction.
<VulnDiscussion>Any password, no matter how complex, can eventually be cracked. Therefore, passwords must be changed at specific intervals. ...Rule Medium Severity -
SRG-APP-000175
<GroupDescription></GroupDescription>Group -
The vCenter Server must enable revocation checking for certificate-based authentication.
<VulnDiscussion>The system must establish the validity of the user-supplied identity certificate using Online Certificate Status Protocol (OC...Rule Medium Severity -
SRG-APP-000190
<GroupDescription></GroupDescription>Group -
The vCenter Server must terminate vSphere Client sessions after 10 minutes of inactivity.
<VulnDiscussion>Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take c...Rule Medium Severity -
SRG-APP-000211
<GroupDescription></GroupDescription>Group -
The vCenter Server users must have the correct roles assigned.
<VulnDiscussion>Users and service accounts must only be assigned privileges they require. Least privilege requires that these privileges must...Rule Medium Severity -
SRG-APP-000247
<GroupDescription></GroupDescription>Group -
The vCenter Server must manage excess capacity, bandwidth, or other redundancy to limit the effects of information flooding types of denial-of-service (DoS) attacks by enabling Network I/O Control (NIOC).
<VulnDiscussion>DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...Rule Medium Severity -
SRG-APP-000291
<GroupDescription></GroupDescription>Group -
The vCenter Server must provide an immediate real-time alert to the system administrator (SA) and information system security officer (ISSO), at a minimum, on every Single Sign-On (SSO) account action.
<VulnDiscussion>Once an attacker establishes initial access to a system, they often attempt to create a persistent method of reestablishing a...Rule Medium Severity -
SRG-APP-000345
<GroupDescription></GroupDescription>Group -
The vCenter Server must set the interval for counting failed login attempts to at least 15 minutes.
<VulnDiscussion>By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise...Rule Medium Severity -
SRG-APP-000358
<GroupDescription></GroupDescription>Group -
The vCenter Server must be configured to send logs to a central log server.
<VulnDiscussion>vCenter must be configured to send near real-time log data to syslog collectors so information will be available to investiga...Rule Medium Severity -
SRG-APP-000360
<GroupDescription></GroupDescription>Group -
vCenter must provide an immediate real-time alert to the system administrator (SA) and information system security officer (ISSO), at a minimum, of all audit failure events requiring real-time alerts.
<VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....Rule Medium Severity -
SRG-APP-000371
<GroupDescription></GroupDescription>Group -
The vCenter Server must compare internal information system clocks at least every 24 hours with an authoritative time server.
<VulnDiscussion>Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the cor...Rule Medium Severity -
SRG-APP-000427
<GroupDescription></GroupDescription>Group -
The vCenter Server Machine Secure Sockets Layer (SSL) certificate must be issued by a DOD certificate authority.
<VulnDiscussion>Untrusted certificate authorities (CA) can issue certificates, but they may be issued by organizations or individuals that se...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The vCenter Server must disable the Customer Experience Improvement Program (CEIP).
<VulnDiscussion>The VMware CEIP sends VMware anonymized system information that is used to improve the quality, reliability, and functionalit...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.