Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000358

    <GroupDescription></GroupDescription>
    Group
  • The vCenter Server must be configured to send logs to a central log server.

    &lt;VulnDiscussion&gt;vCenter must be configured to send near real-time log data to syslog collectors so information will be available to investiga...
    Rule Medium Severity
  • SRG-APP-000360

    <GroupDescription></GroupDescription>
    Group
  • vCenter must provide an immediate real-time alert to the system administrator (SA) and information system security officer (ISSO), at a minimum, of all audit failure events requiring real-time alerts.

    &lt;VulnDiscussion&gt;It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....
    Rule Medium Severity
  • SRG-APP-000371

    <GroupDescription></GroupDescription>
    Group
  • The vCenter Server must compare internal information system clocks at least every 24 hours with an authoritative time server.

    &lt;VulnDiscussion&gt;Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the cor...
    Rule Medium Severity
  • SRG-APP-000427

    <GroupDescription></GroupDescription>
    Group
  • The vCenter Server Machine Secure Sockets Layer (SSL) certificate must be issued by a DOD certificate authority.

    &lt;VulnDiscussion&gt;Untrusted certificate authorities (CA) can issue certificates, but they may be issued by organizations or individuals that se...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The vCenter Server must disable the Customer Experience Improvement Program (CEIP).

    &lt;VulnDiscussion&gt;The VMware CEIP sends VMware anonymized system information that is used to improve the quality, reliability, and functionalit...
    Rule Medium Severity
  • SRG-APP-000575

    <GroupDescription></GroupDescription>
    Group
  • The vCenter server must enforce SNMPv3 security features where SNMP is required.

    &lt;VulnDiscussion&gt;SNMPv3 supports commercial-grade security, including authentication, authorization, access control, and privacy. Previous ver...
    Rule Medium Severity
  • SRG-APP-000575

    <GroupDescription></GroupDescription>
    Group
  • The vCenter server must disable SNMPv1/2 receivers.

    &lt;VulnDiscussion&gt;SNMPv3 supports commercial-grade security, including authentication, authorization, access control, and privacy. Previous ver...
    Rule Medium Severity
  • SRG-APP-000345

    <GroupDescription></GroupDescription>
    Group
  • The vCenter Server must require an administrator to unlock an account locked due to excessive login failures.

    &lt;VulnDiscussion&gt;By requiring that Single Sign-On (SSO) accounts be unlocked manually, the risk of unauthorized access via user password guess...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The vCenter Server must disable the distributed virtual switch health check.

    &lt;VulnDiscussion&gt;Network health check is disabled by default. Once enabled, the health check packets contain information on host#, vds#, and p...
    Rule Low Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The vCenter Server must set the distributed port group Forged Transmits policy to "Reject".

    &lt;VulnDiscussion&gt;If the virtual machine operating system changes the Media Access Control (MAC) address, the operating system can send frames ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules