Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480-VMM-002000

    <GroupDescription></GroupDescription>
    Group
  • All port groups on standard switches must not be configured to virtual local area network (VLAN) values reserved by upstream physical switches.

    &lt;VulnDiscussion&gt;Certain physical switches reserve certain VLAN IDs for internal purposes and often disallow traffic configured to these value...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must not provide root/administrator-level access to Common Information Model (CIM)-based hardware monitoring tools or other third-party applications.

    &lt;VulnDiscussion&gt;The CIM system provides an interface that enables hardware-level management from remote applications via a set of standard ap...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must have all security patches and updates installed.

    &lt;VulnDiscussion&gt;Installing software updates is a fundamental mitigation against the exploitation of publicly known vulnerabilities.&lt;/VulnD...
    Rule High Severity
  • SRG-OS-000480-VMM-002000

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must exclusively enable Transport Layer Security (TLS) 1.2 for all endpoints.

    &lt;VulnDiscussion&gt;TLS 1.0 and 1.1 are deprecated protocols with well-published shortcomings and vulnerabilities. TLS 1.2 should be enabled on a...
    Rule High Severity
  • SRG-OS-000480-VMM-002000

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must enable Secure Boot.

    &lt;VulnDiscussion&gt;Secure Boot is part of the Unified Extensible Firmware Interface (UEFI) firmware standard. With UEFI Secure Boot enabled, a h...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must use DOD-approved certificates.

    &lt;VulnDiscussion&gt;The default self-signed host certificate issued by the VMware Certificate Authority (VMCA) must be replaced with a DOD-approv...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must not suppress warnings that the local or remote shell sessions are enabled.

    &lt;VulnDiscussion&gt;Warnings that local or remote shell sessions are enabled alert administrators to activity they may not be aware of and need t...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must not suppress warnings about unmitigated hyperthreading vulnerabilities.

    &lt;VulnDiscussion&gt;The L1 Terminal Fault (L1TF) CPU vulnerabilities published in 2018 have patches and mitigations available in vSphere. However...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host Secure Shell (SSH) daemon must disable port forwarding.

    &lt;VulnDiscussion&gt;While enabling Transmission Control Protocol (TCP) tunnels is a valuable function of sshd, this feature is not appropriate fo...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host OpenSLP service must be disabled.

    &lt;VulnDiscussion&gt;OpenSLP implements the Service Location Protocol to help CIM clients discover CIM servers over TCP 427. This service is not w...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules