Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000425-VMM-001710

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must maintain the confidentiality and integrity of information during transmission by exclusively enabling Transport Layer Security (TLS) 1.2.

    &lt;VulnDiscussion&gt;TLS 1.0 and 1.1 are deprecated protocols with well-published shortcomings and vulnerabilities. TLS 1.2 should be enabled on a...
    Rule High Severity
  • SRG-OS-000478-VMM-001980

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host Secure Shell (SSH) daemon must be configured to only use FIPS 140-2 validated ciphers.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. ESXi must impl...
    Rule Medium Severity
  • SRG-OS-000480-VMM-002000

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host DCUI.Access list must be verified.

    &lt;VulnDiscussion&gt;Lockdown mode disables direct host access, requiring that administrators manage hosts from vCenter Server. However, if a host...
    Rule Medium Severity
  • SRG-OS-000023-VMM-000060

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must display the Standard Mandatory DOD Notice and Consent Banner before granting access to the system via Secure Shell (SSH).

    &lt;VulnDiscussion&gt;Display of a standardized and approved use notification before granting access to the host ensures privacy and security notif...
    Rule Medium Severity
  • SRG-OS-000023-VMM-000060

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host Secure Shell (SSH) daemon must display the Standard Mandatory DOD Notice and Consent Banner before granting access to the system.

    &lt;VulnDiscussion&gt;Display of a standardized and approved use notification before granting access to the host ensures privacy and security notif...
    Rule Medium Severity
  • SRG-OS-000095-VMM-000480

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must be configured to disable nonessential capabilities by disabling Secure Shell (SSH).

    &lt;VulnDiscussion&gt;The ESXi Shell is an interactive command line interface (CLI) available at the ESXi server console. The ESXi shell provides t...
    Rule Medium Severity
  • SRG-OS-000095-VMM-000480

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must be configured to disable nonessential capabilities by disabling the ESXi shell.

    &lt;VulnDiscussion&gt;The ESXi Shell is an interactive command line environment available locally from the Direct Console User Interface (DCUI) or ...
    Rule Medium Severity
  • SRG-OS-000163-VMM-000700

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must automatically stop shell services after 10 minutes.

    &lt;VulnDiscussion&gt;When the ESXi Shell or Secure Shell (SSH) services are enabled on a host, they will run indefinitely. To avoid having these s...
    Rule Medium Severity
  • SRG-OS-000163-VMM-000700

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must set a timeout to automatically end idle DCUI sessions after 10 minutes.

    &lt;VulnDiscussion&gt;When the Direct Console User Interface (DCUI) is enabled and logged in, it should be automatically logged out if left logged ...
    Rule Medium Severity
  • SRG-OS-000423-VMM-001700

    <GroupDescription></GroupDescription>
    Group
  • The ESXi host must protect the confidentiality and integrity of transmitted information by isolating ESXi management traffic.

    &lt;VulnDiscussion&gt;The vSphere management network provides access to the vSphere management interface on each component. Services running on the...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules