Skip to content

VMware vSphere 8.0 Virtual Machine Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Virtual machines (VMs) must disable access through the "dvfilter" network Application Programming Interface (API).

    <VulnDiscussion>An attacker might compromise a VM by using the "dvFilter" API. Configure only VMs that need this access to use the API.</V...
    Rule Low Severity
  • SRG-OS-000480-VMM-002000

    <GroupDescription></GroupDescription>
    Group
  • Virtual machines (VMs) must be configured to lock when the last console connection is closed.

    &lt;VulnDiscussion&gt;When accessing the VM console, the guest operating system must be locked when the last console user disconnects, limiting the...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    <GroupDescription></GroupDescription>
    Group
  • Virtual machines (VMs) must disable 3D features when not required.

    &lt;VulnDiscussion&gt;For performance reasons, it is recommended that 3D acceleration be disabled on virtual machines that do not require 3D functi...
    Rule Low Severity
  • SRG-OS-000480-VMM-002000

    <GroupDescription></GroupDescription>
    Group
  • Virtual machines (VMs) must enable encryption for vMotion.

    &lt;VulnDiscussion&gt;vMotion migrations in vSphere 6.0 and earlier transferred working memory and CPU state information in clear text over the vMo...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    <GroupDescription></GroupDescription>
    Group
  • Virtual machines (VMs) must enable encryption for Fault Tolerance.

    &lt;VulnDiscussion&gt;Fault Tolerance log traffic can be encrypted. This could contain sensitive data from the protected machine's memory or CPU in...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    <GroupDescription></GroupDescription>
    Group
  • Virtual machines (VMs) must configure log size.

    &lt;VulnDiscussion&gt;The ESXi hypervisor maintains logs for each individual VM by default. These logs contain information including but not limite...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    <GroupDescription></GroupDescription>
    Group
  • Virtual machines (VMs) must configure log retention.

    &lt;VulnDiscussion&gt;The ESXi hypervisor maintains logs for each individual VM by default. These logs contain information including but not limite...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    <GroupDescription></GroupDescription>
    Group
  • Virtual machines (VMs) must enable logging.

    &lt;VulnDiscussion&gt;The ESXi hypervisor maintains logs for each individual VM by default. These logs contain information including, but not limit...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    <GroupDescription></GroupDescription>
    Group
  • Virtual machines (VMs) must not use independent, nonpersistent disks.

    &lt;VulnDiscussion&gt;The security issue with nonpersistent disk mode is that successful attackers, with a simple shutdown or reboot, might undo or...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    <GroupDescription></GroupDescription>
    Group
  • Virtual machines (VMs) must remove unneeded floppy devices.

    &lt;VulnDiscussion&gt;Ensure no device is connected to a virtual machine if it is not required. For example, floppy, serial, and parallel ports are...
    Rule Medium Severity
  • Virtual machines (VMs) must remove unneeded CD/DVD devices.

    &lt;VulnDiscussion&gt;Ensure no device is connected to a virtual machine if it is not required. For example, floppy, serial, and parallel ports are...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules