STIGQter STIGQter: STIG Summary: VMware vSphere 6.5 ESXi Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 22 Jan 2021:

The ESXi host must enable Secure Boot.

DISA Rule

SV-207673r388482_rule

Vulnerability Number

V-207673

Group Title

SRG-OS-000480-VMM-002000

Rule Version

ESXI-65-000076

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Temporarily enable SSH, connect to the ESXi host and run the following command:

/usr/lib/vmware/secureboot/bin/secureBoot.py -c

If the output indicates that Secure Boot cannot be enabled, correct the discrepancies and try again. If the discrepancies cannot be rectified this finding is downgraded to a CAT III.

Consult your vendor documentation and boot the host into BIOS setup mode. Enable UEFI boot mode and Secure Boot. Restart the host.

Temporarily enable SSH, connect to the ESXi host and run the following command to verify that Secure Boot is enabled:

/usr/lib/vmware/secureboot/bin/secureBoot.py -s

Check Contents

Temporarily enable SSH, connect to the ESXi host and run the following command:

/usr/lib/vmware/secureboot/bin/secureBoot.py -s

If the output is not Enabled, this is a finding.

Vulnerability Number

V-207673

Documentable

False

Rule Version

ESXI-65-000076

Severity Override Guidance

Temporarily enable SSH, connect to the ESXi host and run the following command:

/usr/lib/vmware/secureboot/bin/secureBoot.py -s

If the output is not Enabled, this is a finding.

Check Content Reference

M

Target Key

2925

Comments