III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000575
<GroupDescription></GroupDescription>Group -
The vCenter server must enforce SNMPv3 security features where SNMP is required.
<VulnDiscussion>SNMPv3 supports commercial-grade security, including authentication, authorization, access control, and privacy. Previous ver...Rule Medium Severity -
SRG-APP-000575
<GroupDescription></GroupDescription>Group -
The vCenter server must disable SNMPv1/2 receivers.
<VulnDiscussion>SNMPv3 supports commercial-grade security, including authentication, authorization, access control, and privacy. Previous ver...Rule Medium Severity -
SRG-APP-000345
<GroupDescription></GroupDescription>Group -
The vCenter Server must require an administrator to unlock an account locked due to excessive login failures.
<VulnDiscussion>By requiring that Single Sign-On (SSO) accounts be unlocked manually, the risk of unauthorized access via user password guess...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The vCenter Server must disable the distributed virtual switch health check.
<VulnDiscussion>Network health check is disabled by default. Once enabled, the health check packets contain information on host#, vds#, and p...Rule Low Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The vCenter Server must set the distributed port group Forged Transmits policy to "Reject".
<VulnDiscussion>If the virtual machine operating system changes the Media Access Control (MAC) address, the operating system can send frames ...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The vCenter Server must set the distributed port group Media Access Control (MAC) Address Change policy to "Reject".
<VulnDiscussion>If the virtual machine operating system changes the MAC address, it can send frames with an impersonated source MAC address a...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The vCenter Server must set the distributed port group Promiscuous Mode policy to "Reject".
<VulnDiscussion>When promiscuous mode is enabled for a virtual switch, all virtual machines connected to the port group have the potential of...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The vCenter Server must only send NetFlow traffic to authorized collectors.
<VulnDiscussion>The distributed virtual switch can export NetFlow information about traffic crossing the switch. NetFlow exports are not encr...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The vCenter Server must configure all port groups to a value other than that of the native virtual local area network (VLAN).
<VulnDiscussion>ESXi does not use the concept of native VLAN. Frames with VLAN specified in the port group will have a tag, but frames with V...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The vCenter Server must not configure VLAN Trunking unless Virtual Guest Tagging (VGT) is required and authorized.
<VulnDiscussion>When a port group is set to VLAN Trunking, the vSwitch passes all network frames in the specified range to the attached virtu...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The vCenter Server must not configure all port groups to virtual local area network (VLAN) values reserved by upstream physical switches.
<VulnDiscussion>Certain physical switches reserve certain VLAN IDs for internal purposes and often disallow traffic configured to these value...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The vCenter Server must configure the "vpxuser" auto-password to be changed every 30 days.
<VulnDiscussion>By default, vCenter will change the "vpxuser" password automatically every 30 days. Ensure this setting meets site policies. ...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The vCenter Server must configure the "vpxuser" password to meet length policy.
<VulnDiscussion>The "vpxuser" password default length is 32 characters. Ensure this setting meets site policies; if not, configure to meet pa...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The vCenter Server must be isolated from the public internet but must still allow for patch notification and delivery.
<VulnDiscussion>vCenter and the embedded Lifecycle Manager system must never have a direct route to the internet. Despite this, updates and p...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The vCenter Server must use unique service accounts when applications connect to vCenter.
<VulnDiscussion>To not violate nonrepudiation (i.e., deny the authenticity of who is connecting to vCenter), when applications need to connec...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The vCenter Server must protect the confidentiality and integrity of transmitted information by isolating Internet Protocol (IP)-based storage traffic.
<VulnDiscussion>Virtual machines might share virtual switches and virtual local area networks (VLAN) with the IP-based storage configurations...Rule Medium Severity -
SRG-APP-000358
<GroupDescription></GroupDescription>Group -
The vCenter server must be configured to send events to a central log server.
<VulnDiscussion>vCenter server generates volumes of security-relevant application-level events. Examples include logins, system reconfigurati...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The vCenter Server must disable or restrict the connectivity between vSAN Health Check and public Hardware Compatibility List (HCL) by use of an external proxy server.
<VulnDiscussion>The vSAN Health Check is able to download the HCL from VMware to check compliance against the underlying vSAN Cluster hosts. ...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The vCenter Server must configure the vSAN Datastore name to a unique name.
<VulnDiscussion>A vSAN Datastore name by default is "vsanDatastore". If more than one vSAN cluster is present in vCenter, both datastores wil...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The vCenter Server must disable Username/Password and Windows Integrated Authentication.
<VulnDiscussion>All forms of authentication other than Common Access Card (CAC) must be disabled. Password authentication can be temporarily ...Rule Low Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The vCenter Server must restrict access to the default roles with cryptographic permissions.
<VulnDiscussion>In vSphere, a number of default roles contain permission to perform cryptographic operations such as Key Management Server (K...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The vCenter Server must restrict access to cryptographic permissions.
<VulnDiscussion>These permissions must be reserved for cryptographic administrators where virtual machine encryption and/or vSAN encryption i...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The vCenter Server must have Mutual Challenge Handshake Authentication Protocol (CHAP) configured for vSAN Internet Small Computer System Interface (iSCSI) targets.
<VulnDiscussion>When enabled, vSphere performs bidirectional authentication of both the iSCSI target and host. When not authenticating both t...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The vCenter Server must have new Key Encryption Keys (KEKs) reissued at regular intervals for vSAN encrypted datastore(s).
<VulnDiscussion>The KEK for a vSAN encrypted datastore is generated by the Key Management Server (KMS) and serves as a wrapper and lock aroun...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The vCenter Server must use secure Lightweight Directory Access Protocol (LDAPS) when adding an LDAP identity source.
<VulnDiscussion>LDAP is an industry standard protocol for querying directory services such as Active Directory. This protocol can operate in ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.