I - Mission Critical Public
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000516
Group -
The vCenter Server must set the distributed port group Forged Transmits policy to "Reject".
If the virtual machine operating system changes the Media Access Control (MAC) address, the operating system can send frames with an impersonated source MAC address at any time. This allows an oper...Rule Medium Severity -
SRG-APP-000516
Group -
The vCenter Server must set the distributed port group Media Access Control (MAC) Address Change policy to "Reject".
If the virtual machine operating system changes the MAC address, it can send frames with an impersonated source MAC address at any time. This allows it to stage malicious attacks on the devices in ...Rule Medium Severity -
SRG-APP-000516
Group -
The vCenter Server must set the distributed port group Promiscuous Mode policy to "Reject".
When promiscuous mode is enabled for a virtual switch, all virtual machines connected to the port group have the potential of reading all packets across that network, meaning only the virtual machi...Rule Medium Severity -
SRG-APP-000516
Group -
The vCenter Server must only send NetFlow traffic to authorized collectors.
The distributed virtual switch can export NetFlow information about traffic crossing the switch. NetFlow exports are not encrypted and can contain information about the virtual network, making it e...Rule Medium Severity -
SRG-APP-000516
Group -
The vCenter Server must configure all port groups to a value other than that of the native virtual local area network (VLAN).
ESXi does not use the concept of native VLAN. Frames with VLAN specified in the port group will have a tag, but frames with VLAN not specified in the port group are not tagged and therefore will en...Rule Medium Severity -
SRG-APP-000516
Group -
The vCenter Server must not configure VLAN Trunking unless Virtual Guest Tagging (VGT) is required and authorized.
When a port group is set to VLAN Trunking, the vSwitch passes all network frames in the specified range to the attached virtual machines without modifying the virtual local area network (VLAN) tags...Rule Medium Severity -
SRG-APP-000516
Group -
The vCenter Server must not configure all port groups to virtual local area network (VLAN) values reserved by upstream physical switches.
Certain physical switches reserve certain VLAN IDs for internal purposes and often disallow traffic configured to these values. For example, Cisco Catalyst switches typically reserve VLANs 1001 to ...Rule Medium Severity -
SRG-APP-000516
Group -
The vCenter Server must configure the "vpxuser" auto-password to be changed every 30 days.
By default, vCenter will change the "vpxuser" password automatically every 30 days. Ensure this setting meets site policies. If it does not, configure it to meet password aging policies. Note: It ...Rule Medium Severity -
SRG-APP-000516
Group -
The vCenter Server must configure the "vpxuser" password to meet length policy.
The "vpxuser" password default length is 32 characters. Ensure this setting meets site policies; if not, configure to meet password length policies. Longer passwords make brute-force password atta...Rule Medium Severity -
SRG-APP-000516
Group -
The vCenter Server must be isolated from the public internet but must still allow for patch notification and delivery.
vCenter and the embedded Lifecycle Manager system must never have a direct route to the internet. Despite this, updates and patches sourced from VMware on the internet must be delivered in a timely...Rule Low Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.