Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000037-VMM-000150

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must produce audit records containing information to establish what type of events occurred.

    &lt;VulnDiscussion&gt;Without establishing what types of events occurred, it would be difficult to establish, correlate, and investigate the events...
    Rule Medium Severity
  • SRG-OS-000069-VMM-000360

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must be configured with a sufficiently complex password policy.

    &lt;VulnDiscussion&gt;To enforce the use of complex passwords, minimum numbers of characters of different classes are mandated. The use of comple...
    Rule Medium Severity
  • SRG-OS-000077-VMM-000440

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must prohibit the reuse of passwords within five iterations.

    &lt;VulnDiscussion&gt;If a user or root used the same password continuously or was allowed to change it back shortly after being forced to change i...
    Rule Medium Severity
  • SRG-OS-000095-VMM-000480

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must disable the Managed Object Browser (MOB).

    &lt;VulnDiscussion&gt;The MOB provides a way to explore the object model used by the VMkernel to manage the host and enables configurations to be c...
    Rule Medium Severity
  • SRG-OS-000095-VMM-000480

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must be configured to disable nonessential capabilities by disabling Secure Shell (SSH).

    &lt;VulnDiscussion&gt;The ESXi Shell is an interactive command line interface (CLI) available at the ESXi server console. The ESXi shell provides t...
    Rule Medium Severity
  • SRG-OS-000095-VMM-000480

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must disable ESXi Shell unless needed for diagnostics or troubleshooting.

    &lt;VulnDiscussion&gt;The ESXi Shell is an interactive command line environment available locally from the Direct Console User Interface (DCUI) or ...
    Rule Medium Severity
  • SRG-OS-000104-VMM-000500

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must use Active Directory for local user authentication.

    &lt;VulnDiscussion&gt;Join ESXi hosts to an Active Directory domain to eliminate the need to create and maintain multiple local user accounts. Usin...
    Rule Low Severity
  • SRG-OS-000104-VMM-000500

    <GroupDescription></GroupDescription>
    Group
  • ESXi hosts using Host Profiles and/or Auto Deploy must use the vSphere Authentication Proxy to protect passwords when adding themselves to Active Directory.

    &lt;VulnDiscussion&gt;If a host is configured to join an Active Directory domain using Host Profiles and/or Auto Deploy, the Active Directory crede...
    Rule Medium Severity
  • SRG-OS-000104-VMM-000500

    <GroupDescription></GroupDescription>
    Group
  • Active Directory ESX Admin group membership must not be used when adding ESXi hosts to Active Directory.

    &lt;VulnDiscussion&gt;When adding ESXi hosts to Active Directory, all user/group accounts assigned to the Active Directory group \"ESX Admins\" wil...
    Rule Medium Severity
  • SRG-OS-000163-VMM-000700

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must set a timeout to automatically disable idle shell sessions after two minutes.

    &lt;VulnDiscussion&gt;If a user forgets to log out of their local or remote ESXi Shell session, the idle connection will remain open indefinitely a...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules