Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480-VMM-002000

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must disable Inter-Virtual Machine (VM) Transparent Page Sharing.

    &lt;VulnDiscussion&gt;Published academic papers have demonstrated that by forcing a flush and reload of cache memory, it is possible to measure mem...
    Rule Low Severity
  • SRG-OS-000480-VMM-002000

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must configure the firewall to restrict access to services running on the host.

    &lt;VulnDiscussion&gt;Unrestricted access to services running on an ESXi host can expose a host to outside attacks and unauthorized access. Reduce ...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must configure the firewall to block network traffic by default.

    &lt;VulnDiscussion&gt;In addition to service-specific firewall rules, ESXi has a default firewall rule policy to allow or deny incoming and outgoin...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must enable Bridge Protocol Data Units (BPDU) filter on the host to prevent being locked out of physical switch ports with Portfast and BPDU Guard enabled.

    &lt;VulnDiscussion&gt;BPDU Guard and Portfast are commonly enabled on the physical switch to which the ESXi host is directly connected to reduce th...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    <GroupDescription></GroupDescription>
    Group
  • All port groups on standard switches must be configured to reject forged transmits.

    &lt;VulnDiscussion&gt;If the virtual machine (VM) operating system changes the Media Access Control (MAC) address, the operating system can send fr...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    <GroupDescription></GroupDescription>
    Group
  • All port groups on standard switches must be configured to reject guest Media Access Control (MAC) address changes.

    &lt;VulnDiscussion&gt;If the virtual machine (VM) operating system changes the MAC address, it can send frames with an impersonated source MAC addr...
    Rule High Severity
  • SRG-OS-000480-VMM-002000

    <GroupDescription></GroupDescription>
    Group
  • All port groups on standard switches must be configured to reject guest promiscuous mode requests.

    &lt;VulnDiscussion&gt;When promiscuous mode is enabled for a virtual switch, all virtual machines (VMs) connected to the Portgroup have the potenti...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    <GroupDescription></GroupDescription>
    Group
  • Use of the dvFilter network application programming interfaces (APIs) must be restricted.

    &lt;VulnDiscussion&gt;If the organization is not using products that use the dvfilter network API, the host should not be configured to send networ...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    <GroupDescription></GroupDescription>
    Group
  • All port groups on standard switches must be configured to a value other than that of the native virtual local area network (VLAN).

    &lt;VulnDiscussion&gt;ESXi does not use the concept of native VLAN. Frames with a VLAN specified in the port group will have a tag, but frames with...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    <GroupDescription></GroupDescription>
    Group
  • All port groups on standard switches must not be configured to virtual local area network (VLAN) 4095 unless Virtual Guest Tagging (VGT) is required.

    &lt;VulnDiscussion&gt;When a port group is set to VLAN 4095, the vSwitch passes all network frames to the attached virtual machines (VMs) without m...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules