VMware vSphere 8.0 ESXi Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The ESXi host must be configured to disable nonessential capabilities by disabling the Managed Object Browser (MOB).
<VulnDiscussion>The MOB provides a way to explore the object model used by the VMkernel to manage the host and enables configurations to be c...Rule Medium Severity -
SRG-OS-000104-VMM-000500
<GroupDescription></GroupDescription>Group -
The ESXi host must uniquely identify and must authenticate organizational users by using Active Directory.
<VulnDiscussion>Join ESXi hosts to an Active Directory domain to eliminate the need to create and maintain multiple local user accounts. Usin...Rule Low Severity -
SRG-OS-000107-VMM-000530
<GroupDescription></GroupDescription>Group -
The ESXi host Secure Shell (SSH) daemon must set a timeout count on idle sessions.
<VulnDiscussion>Setting a timeout ensures that a user login will be terminated as soon as the "ClientAliveCountMax" is reached.</VulnDiscu...Rule Low Severity -
SRG-OS-000480-VMM-002000
<GroupDescription></GroupDescription>Group -
The ESXi host must set a timeout to automatically end idle shell sessions after fifteen minutes.
<VulnDiscussion>If a user forgets to log out of their local or remote ESXi Shell session, the idle connection will remain open indefinitely a...Rule Medium Severity -
SRG-OS-000257-VMM-000910
<GroupDescription></GroupDescription>Group -
The ESXi host must implement Secure Boot enforcement.
<VulnDiscussion>Secure Boot is part of the UEFI firmware standard. With UEFI Secure Boot enabled, a host refuses to load any UEFI driver or a...Rule Medium Severity -
SRG-OS-000278-VMM-001000
<GroupDescription></GroupDescription>Group -
The ESXi host must enable Secure Boot.
<VulnDiscussion>Secure Boot is part of the Unified Extensible Firmware Interface (UEFI) firmware standard. With UEFI Secure Boot enabled, a h...Rule Medium Severity -
SRG-OS-000329-VMM-001180
<GroupDescription></GroupDescription>Group -
The ESXi host must enforce an unlock timeout of 15 minutes after a user account is locked out.
<VulnDiscussion>By enforcing a reasonable unlock timeout after multiple failed logon attempts, the risk of unauthorized access via user passw...Rule Medium Severity -
SRG-OS-000341-VMM-001220
<GroupDescription></GroupDescription>Group -
The ESXi host must allocate audit record storage capacity to store at least one week's worth of audit records.
<VulnDiscussion>In order to ensure ESXi has sufficient storage capacity in which to write the audit logs, audit record storage capacity shoul...Rule Medium Severity -
SRG-OS-000342-VMM-001230
<GroupDescription></GroupDescription>Group -
The ESXi host Secure Shell (SSH) daemon must set a timeout interval on idle sessions.
<VulnDiscussion>Automatically logging out idle users guards against compromises via hijacked administrative sessions.</VulnDiscussion>&...Rule Low Severity -
SRG-OS-000480-VMM-002000
<GroupDescription></GroupDescription>Group -
The ESXi host must off-load logs via syslog.
<VulnDiscussion>Remote logging to a central log host provides a secure, centralized store for ESXi logs. By gathering host log files onto a c...Rule Medium Severity -
SRG-OS-000355-VMM-001330
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.