Skip to content

VMware vSphere 8.0 ESXi Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The ESXi host must synchronize internal information system clocks to an authoritative time source.

    <VulnDiscussion>To ensure the accuracy of the system clock, it must be synchronized with an authoritative time source within DOD. Many system...
    Rule Medium Severity
  • SRG-OS-000366-VMM-001430

    <GroupDescription></GroupDescription>
    Group
  • The ESXi Image Profile and vSphere Installation Bundle (VIB) acceptance level must be verified.

    &lt;VulnDiscussion&gt;Verify the ESXi Image Profile to only allow signed VIBs. An unsigned VIB represents untested code installed on an ESXi host. ...
    Rule High Severity
  • SRG-OS-000379-VMM-001550

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must enable bidirectional Challenge-Handshake Authentication Protocol (CHAP) authentication for Internet Small Computer Systems Interface (iSCSI) traffic.

    &lt;VulnDiscussion&gt;When enabled, vSphere performs bidirectional authentication of both the iSCSI target and host. When not authenticating both t...
    Rule Medium Severity
  • SRG-OS-000423-VMM-001700

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must protect the confidentiality and integrity of transmitted information by isolating vMotion traffic.

    &lt;VulnDiscussion&gt;While encrypted vMotion is available, vMotion traffic should still be sequestered from other traffic to further protect it fr...
    Rule Medium Severity
  • SRG-OS-000425-VMM-001710

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must maintain the confidentiality and integrity of information during transmission by exclusively enabling Transport Layer Security (TLS) 1.2.

    &lt;VulnDiscussion&gt;TLS 1.0 and 1.1 are deprecated protocols with well-published shortcomings and vulnerabilities. TLS 1.2 should be enabled on a...
    Rule High Severity
  • SRG-OS-000478-VMM-001980

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host Secure Shell (SSH) daemon must be configured to only use FIPS 140-2 validated ciphers.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. ESXi must impl...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host DCUI.Access list must be verified.

    &lt;VulnDiscussion&gt;Lockdown mode disables direct host access, requiring that administrators manage hosts from vCenter Server. However, if a host...
    Rule Medium Severity
  • SRG-OS-000023-VMM-000060

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must display the Standard Mandatory DOD Notice and Consent Banner before granting access to the system via Secure Shell (SSH).

    &lt;VulnDiscussion&gt;Display of a standardized and approved use notification before granting access to the host ensures privacy and security notif...
    Rule Medium Severity
  • SRG-OS-000023-VMM-000060

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host Secure Shell (SSH) daemon must display the Standard Mandatory DOD Notice and Consent Banner before granting access to the system.

    &lt;VulnDiscussion&gt;Display of a standardized and approved use notification before granting access to the host ensures privacy and security notif...
    Rule Medium Severity
  • The ESXi host must be configured to disable nonessential capabilities by disabling Secure Shell (SSH).

    &lt;VulnDiscussion&gt;The ESXi Shell is an interactive command line interface (CLI) available at the ESXi server console. The ESXi shell provides t...
    Rule Medium Severity
  • SRG-OS-000095-VMM-000480

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must be configured to disable nonessential capabilities by disabling the ESXi shell.

    &lt;VulnDiscussion&gt;The ESXi Shell is an interactive command line environment available locally from the Direct Console User Interface (DCUI) or ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules