Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000423-VMM-001700

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must protect the confidentiality and integrity of transmitted information by isolating vMotion traffic.

    &lt;VulnDiscussion&gt;While encrypted vMotion is available, vMotion traffic should still be sequestered from other traffic to further protect it fr...
    Rule Medium Severity
  • SRG-OS-000423-VMM-001700

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must protect the confidentiality and integrity of transmitted information by protecting ESXi management traffic.

    &lt;VulnDiscussion&gt;The vSphere management network provides access to the vSphere management interface on each component. Services running on the...
    Rule Medium Severity
  • SRG-OS-000423-VMM-001700

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must protect the confidentiality and integrity of transmitted information by isolating IP-based storage traffic.

    &lt;VulnDiscussion&gt;Virtual machines (VMs) might share virtual switches and VLANs with the IP-based storage configurations. IP-based storage incl...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    <GroupDescription></GroupDescription>
    Group
  • Simple Network Management Protocol (SNMP) must be configured properly on the ESXi host.

    &lt;VulnDiscussion&gt;If SNMP is not being used, it must remain disabled. If it is being used, the proper trap destination must be configured. If S...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must enable bidirectional Challenge-Handshake Authentication Protocol (CHAP) authentication for Internet Small Computer Systems Interface (iSCSI) traffic.

    &lt;VulnDiscussion&gt;When enabled, vSphere performs bidirectional authentication of both the iSCSI target and host. When not authenticating both t...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules