Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000169

    <GroupDescription></GroupDescription>
    Group
  • The vCenter Server passwords must contain at least one special character.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • SRG-APP-000172

    <GroupDescription></GroupDescription>
    Group
  • The vCenter Server must enable FIPS-validated cryptography.

    &lt;VulnDiscussion&gt;FIPS 140-2 is the current standard for validating that mechanisms used to access cryptographic modules use authentication tha...
    Rule High Severity
  • SRG-APP-000174

    <GroupDescription></GroupDescription>
    Group
  • The vCenter Server must enforce a 90-day maximum password lifetime restriction.

    &lt;VulnDiscussion&gt;Any password, no matter how complex, can eventually be cracked. Therefore, passwords must be changed at specific intervals. ...
    Rule Medium Severity
  • SRG-APP-000175

    <GroupDescription></GroupDescription>
    Group
  • The vCenter Server must enable revocation checking for certificate-based authentication.

    &lt;VulnDiscussion&gt;The system must establish the validity of the user-supplied identity certificate using Online Certificate Status Protocol (OC...
    Rule Medium Severity
  • SRG-APP-000190

    <GroupDescription></GroupDescription>
    Group
  • The vCenter Server must terminate vSphere Client sessions after 15 minutes of inactivity.

    &lt;VulnDiscussion&gt;Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take c...
    Rule Medium Severity
  • SRG-APP-000211

    <GroupDescription></GroupDescription>
    Group
  • The vCenter Server user roles must be verified.

    &lt;VulnDiscussion&gt;Users and service accounts must only be assigned privileges they require. Least privilege requires that these privileges must...
    Rule Medium Severity
  • SRG-APP-000247

    <GroupDescription></GroupDescription>
    Group
  • The vCenter Server must manage excess capacity, bandwidth, or other redundancy to limit the effects of information flooding types of denial-of-service (DoS) attacks by enabling Network I/O Control (NIOC).

    &lt;VulnDiscussion&gt;DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...
    Rule Medium Severity
  • SRG-APP-000291

    <GroupDescription></GroupDescription>
    Group
  • The vCenter Server must provide an immediate real-time alert to the system administrator (SA) and information system security officer (ISSO), at a minimum, on every Single Sign-On (SSO) account action.

    &lt;VulnDiscussion&gt;Once an attacker establishes initial access to a system, they often attempt to create a persistent method of reestablishing a...
    Rule Medium Severity
  • SRG-APP-000345

    <GroupDescription></GroupDescription>
    Group
  • The vCenter Server must set the interval for counting failed login attempts to at least 15 minutes.

    &lt;VulnDiscussion&gt;By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise...
    Rule Medium Severity
  • SRG-APP-000358

    <GroupDescription></GroupDescription>
    Group
  • The vCenter Server must be configured to send logs to a central log server.

    &lt;VulnDiscussion&gt;vCenter must be configured to send near real-time log data to syslog collectors so information will be available to investiga...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules