Skip to content

II - Mission Support Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000107-VMM-000530

    Group
  • The ESXi host Secure Shell (SSH) daemon must ignore .rhosts files.

    SSH trust relationships mean a compromise on one host can allow an attacker to move trivially to other hosts. SSH can emulate the behavior of the obsolete "rsh" command in allowing users to enable ...
    Rule Medium Severity
  • SRG-OS-000163-VMM-000700

    Group
  • The ESXi host must set a timeout to automatically end idle shell sessions after fifteen minutes.

    If a user forgets to log out of their local or remote ESXi Shell session, the idle connection will remain open indefinitely and increase the likelihood of inappropriate host access via session hija...
    Rule Medium Severity
  • SRG-OS-000257-VMM-000910

    Group
  • The ESXi host must implement Secure Boot enforcement.

    Secure Boot is part of the UEFI firmware standard. With UEFI Secure Boot enabled, a host refuses to load any UEFI driver or app unless the operating system bootloader has a valid digital signature....
    Rule Medium Severity
  • SRG-OS-000278-VMM-001000

    Group
  • The ESXi host must enable Secure Boot.

    Secure Boot is part of the Unified Extensible Firmware Interface (UEFI) firmware standard. With UEFI Secure Boot enabled, a host refuses to load any UEFI driver or app unless the operating system b...
    Rule Medium Severity
  • SRG-OS-000329-VMM-001180

    Group
  • The ESXi host must enforce an unlock timeout of 15 minutes after a user account is locked out.

    By enforcing a reasonable unlock timeout after multiple failed logon attempts, the risk of unauthorized access via user password guessing, otherwise known as brute forcing, is reduced. Users must w...
    Rule Medium Severity
  • SRG-OS-000341-VMM-001220

    Group
  • The ESXi host must allocate audit record storage capacity to store at least one week's worth of audit records.

    In order to ensure ESXi has sufficient storage capacity in which to write the audit logs, audit record storage capacity should be configured. If a central audit record storage facility is availab...
    Rule Medium Severity
  • SRG-OS-000342-VMM-001230

    Group
  • The ESXi host must offload logs via syslog.

    Remote logging to a central log host provides a secure, centralized store for ESXi logs. By gathering host log files onto a central host, it can more easily monitor all hosts with a single tool. It...
    Rule Medium Severity
  • SRG-OS-000355-VMM-001330

    Group
  • The ESXi host must synchronize internal information system clocks to an authoritative time source.

    To ensure the accuracy of the system clock, it must be synchronized with an authoritative time source within DOD. Many system functions, including time-based logon and activity restrictions, automa...
    Rule Medium Severity
  • SRG-OS-000366-VMM-001430

    Group
  • The ESXi Image Profile and vSphere Installation Bundle (VIB) acceptance level must be verified.

    Verify the ESXi Image Profile to only allow signed VIBs. An unsigned VIB represents untested code installed on an ESXi host. The ESXi Image profile supports four acceptance levels: 1. VMwareCertif...
    Rule High Severity
  • SRG-OS-000379-VMM-001550

    Group
  • The ESXi host must enable bidirectional Challenge-Handshake Authentication Protocol (CHAP) authentication for Internet Small Computer Systems Interface (iSCSI) traffic.

    When enabled, vSphere performs bidirectional authentication of both the iSCSI target and host. When not authenticating both the iSCSI target and host, there is potential for a man-in-the-middle att...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules