STIGQter STIGQter: STIG Summary:

VMW vSphere 6.5 vCenter Server for Windows Security Technical Implementation Guide

Version: 2

Release: 1 Benchmark Date: 22 Jan 2021

CheckedNameTitle
SV-216825r612237_ruleThe vCenter Server for Windows must prohibit password reuse for a minimum of five generations.
SV-216826r612237_ruleThe vCenter Server for Windows must not automatically refresh client sessions.
SV-216827r612237_ruleThe vCenter Server for Windows must enforce a 60-day maximum password lifetime restriction.
SV-216828r612237_ruleThe vCenter Server for Windows must terminate management sessions after 10 minutes of inactivity.
SV-216829r612237_ruleThe vCenter Server for Windows users must have the correct roles assigned.
SV-216830r612237_ruleThe vCenter Server for Windows must manage excess capacity, bandwidth, or other redundancy to limit the effects of information-flooding types of Denial of Service (DoS) attacks by enabling Network I/O Control (NIOC).
SV-216831r612237_ruleThe vCenter Server for Windows must provide an immediate real-time alert to the SA and ISSO, at a minimum, of all audit failure events.
SV-216832r612237_ruleThe vCenter Server for Windows must use Active Directory authentication.
SV-216833r612237_ruleThe vCenter Server for Windows must limit the use of the built-in SSO administrative account.
SV-216834r612237_ruleThe vCenter Server for Windows must disable the distributed virtual switch health check.
SV-216835r612237_ruleThe vCenter Server for Windows must set the distributed port group Forged Transmits policy to reject.
SV-216836r612237_ruleThe vCenter Server for Windows must set the distributed port group MAC Address Change policy to reject.
SV-216837r612237_ruleThe vCenter Server for Windows must set the distributed port group Promiscuous Mode policy to reject.
SV-216838r612237_ruleThe vCenter Server for Windows must only send NetFlow traffic to authorized collectors.
SV-216839r612237_ruleThe vCenter Server for Windows must not override port group settings at the port level on distributed switches.
SV-216840r612237_ruleThe vCenter Server for Windows must configure all port groups to a value other than that of the native VLAN.
SV-216841r612237_ruleThe vCenter Server for Windows must configure all port groups to VLAN 4095 unless Virtual Guest Tagging (VGT) is required.
SV-216842r612237_ruleThe vCenter Server for Windows must not configure all port groups to VLAN values reserved by upstream physical switches.
SV-216843r612237_ruleThe vCenter Server for Windows must enable SSL for Network File Copy (NFC).
SV-216844r612237_ruleThe vCenter Server for Windows services must be ran using a service account instead of a built-in Windows account.
SV-216845r612237_ruleThe vCenter Server for Windows must configure the vpxuser auto-password to be changed every 30 days.
SV-216846r612237_ruleThe vCenter Server for Windows must configure the vpxuser password meets length policy.
SV-216847r612237_ruleThe vCenter Server for Windows must disable the managed object browser at all times, when not required for the purpose of troubleshooting or maintenance of managed objects.
SV-216848r612237_ruleThe vCenter Server for Windows must check the privilege re-assignment after restarts.
SV-216849r612237_ruleThe vCenter Server for Windows must minimize access to the vCenter server.
SV-216850r612237_ruleThe vCenter Server for Windows Administrators must clean up log files after failed installations.
SV-216851r612237_ruleThe vCenter Server for Windows must enable all tasks to be shown to Administrators in the Web Client.
SV-216852r612237_ruleThe vCenter Server for Windows Administrator role must be secured and assigned to specific users other than a Windows Administrator.
SV-216853r612237_ruleThe vCenter Server for Windows must restrict the connectivity between Update Manager and public patch repositories by use of a separate Update Manager Download Server.
SV-216854r612237_ruleThe vCenter Server for Windows must use a least-privileges assignment for the Update Manager database user.
SV-216855r612237_ruleThe vCenter Server for Windows must use a least-privileges assignment for the vCenter Server database user.
SV-216856r612237_ruleThe vCenter Server for Windows must use unique service accounts when applications connect to vCenter.
SV-216857r612237_rulevCenter Server for Windows plugins must be verified.
SV-216858r612237_ruleThe vCenter Server for Windows must produce audit records containing information to establish what type of events occurred.
SV-216859r612237_ruleThe vCenter Server for Windows passwords must be at least 15 characters in length.
SV-216860r612237_ruleThe vCenter Server for Windows passwords must contain at least one uppercase character.
SV-216861r612237_ruleThe vCenter Server for Windows passwords must contain at least one lowercase character.
SV-216862r612237_ruleThe vCenter Server for Windows passwords must contain at least one numeric character.
SV-216863r612237_ruleThe vCenter Server for Windows passwords must contain at least one special character.
SV-216864r612237_ruleThe vCenter Server for Windows must limit the maximum number of failed login attempts to three.
SV-216865r612237_ruleThe vCenter Server for Windows must set the interval for counting failed login attempts to at least 15 minutes.
SV-216866r612237_ruleThe vCenter Server for Windows must require an administrator to unlock an account locked due to excessive login failures.
SV-216867r612237_ruleThe vCenter Server for Windows must alert administrators on permission creation operations.
SV-216868r612237_ruleThe vCenter Server for Windows must alert administrators on permission deletion operations.
SV-216869r612237_ruleThe vCenter Server for Windows must alert administrators on permission update operations.
SV-216870r612237_ruleThe vCenter Server for Windows users must have the correct roles assigned.
SV-216871r612237_ruleThe vCenter Server for Windows must protect the confidentiality and integrity of transmitted information by isolating IP-based storage traffic.
SV-216872r612237_ruleThe vCenter Server for Windows must enable the vSAN Health Check.
SV-216873r612237_ruleThe vCenter Server for Windows must disable or restrict the connectivity between vSAN Health Check and public Hardware Compatibility List by use of an external proxy server.
SV-216874r612237_ruleThe vCenter Server for Windows must configure the vSAN Datastore name to a unique name.
SV-216875r612237_ruleThe vCenter Server for Windows users must have the correct roles assigned.
SV-216876r612237_ruleThe vCenter Server for Windows must enable TLS 1.2 exclusively.
SV-216877r612237_ruleThe vCenter Server for Windows reverse proxy must use DoD approved certificates.
SV-216878r612237_ruleThe vCenter Server for Windows must enable certificate based authentication.
SV-216879r612237_ruleThe vCenter Server for Windows must enable revocation checking for certificate based authentication.
SV-216880r612237_ruleThe vCenter Server for Windows must disable Password and Windows integrated authentication.
SV-216881r612237_ruleThe vCenter Server for Windows must enable Login banner for vSphere web client.
SV-216882r612237_ruleThe vCenter Server for Windows must restrict access to cryptographic role.
SV-216883r612237_ruleThe vCenter Server for Windows must restrict access to cryptographic permissions.
SV-216884r612237_ruleThe vCenter Server for Windows must have Mutual CHAP configured for vSAN iSCSI targets.
SV-216885r612237_ruleThe vCenter Server for Windows must have new Key Encryption Keys (KEKs) re-issued at regular intervals for vSAN encrypted datastore(s).
SV-216886r612237_ruleThe vCenter Server for Windows must disable the Customer Experience Improvement Program (CEIP).
SV-216887r612237_ruleThe vCenter Server for Windows must use LDAPS when adding an SSO identity source.
SV-216888r612237_ruleThe vCenter Server for Windows must use a limited privilege account when adding an LDAP identity source.
SV-216889r612237_ruleThe vCenter Server for Windows must disable SNMPv1.