STIGQter STIGQter: STIG Summary:

VMware vSphere 6.7 ESXi Security Technical Implementation Guide

Version: 1

Release: 1 Benchmark Date: 09 Mar 2021

CheckedNameTitle
SV-239258r674703_ruleAccess to the ESXi host must be limited by enabling Lockdown Mode.
SV-239259r674706_ruleThe ESXi host must verify the DCUI.Access list.
SV-239260r674709_ruleThe ESXi host must verify the exception users list for Lockdown Mode.
SV-239261r674712_ruleRemote logging for ESXi hosts must be configured.
SV-239262r674715_ruleThe ESXi host must enforce the limit of three consecutive invalid logon attempts by a user.
SV-239263r674718_ruleThe ESXi host must enforce the unlock timeout of 15 minutes after a user account is locked out.
SV-239264r674721_ruleThe ESXi host must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system via the DCUI.
SV-239265r674724_ruleThe ESXi host must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system via SSH.
SV-239266r674727_ruleThe ESXi host SSH daemon must be configured with the DoD logon banner.
SV-239267r674730_ruleThe ESXi host SSH daemon must use DoD-approved encryption to protect the confidentiality of remote access sessions.
SV-239268r674733_ruleThe ESXi host SSH daemon must ignore .rhosts files.
SV-239269r674736_ruleThe ESXi host SSH daemon must not allow host-based authentication.
SV-239270r674739_ruleThe ESXi host SSH daemon must not permit root logins.
SV-239271r674742_ruleThe ESXi host SSH daemon must not allow authentication using an empty password.
SV-239272r674745_ruleThe ESXi host SSH daemon must not permit user environment settings.
SV-239273r674748_ruleThe ESXi host SSH daemon must not permit GSSAPI authentication.
SV-239274r674751_ruleThe ESXi host SSH daemon must not permit Kerberos authentication.
SV-239275r674754_ruleThe ESXi host SSH daemon must perform strict mode checking of home directory configuration files.
SV-239276r674757_ruleThe ESXi host SSH daemon must not allow compression or must only allow compression after successful authentication.
SV-239277r674760_ruleThe ESXi host SSH daemon must be configured to not allow gateway ports.
SV-239278r674763_ruleThe ESXi host SSH daemon must be configured to not allow X11 forwarding.
SV-239279r674766_ruleThe ESXi host SSH daemon must not accept environment variables from the client.
SV-239280r674769_ruleThe ESXi host SSH daemon must not permit tunnels.
SV-239281r674772_ruleThe ESXi host SSH daemon must set a timeout count on idle sessions.
SV-239282r674775_ruleThe ESXi host SSH daemon must set a timeout interval on idle sessions.
SV-239283r674778_ruleThe ESXi host SSH daemon must limit connections to a single session.
SV-239284r674781_ruleThe ESXi host must remove keys from the SSH authorized_keys file.
SV-239285r674784_ruleThe ESXi host must produce audit records containing information to establish what type of events occurred.
SV-239286r674787_ruleThe ESXi host must enforce password complexity by requiring that at least one uppercase character be used.
SV-239287r674790_ruleThe ESXi host must prohibit the reuse of passwords within five iterations.
SV-239288r674793_ruleThe password hashes stored on the ESXi host must have been generated using a FIPS 140-2 approved cryptographic hashing algorithm.
SV-239289r674796_ruleThe ESXi host must disable the Managed Object Browser (MOB).
SV-239290r674799_ruleThe ESXi host must be configured to disable nonessential capabilities by disabling SSH.
SV-239291r674802_ruleThe ESXi host must disable ESXi Shell unless needed for diagnostics or troubleshooting.
SV-239292r674805_ruleThe ESXi host must use Active Directory for local user authentication.
SV-239293r674808_ruleESXi hosts using Host Profiles and/or Auto Deploy must use the vSphere Authentication Proxy to protect passwords when adding themselves to Active Directory.
SV-239294r674811_ruleActive Directory ESX Admin group membership must not be used when adding ESXi hosts to Active Directory.
SV-239295r674814_ruleThe ESXi host must use multifactor authentication for local DCUI access to privileged accounts.
SV-239296r674817_ruleThe ESXi host must set a timeout to automatically disable idle shell sessions after two minutes.
SV-239297r674820_ruleThe ESXi host must terminate shell services after 10 minutes.
SV-239298r674823_ruleThe ESXi host must log out of the console UI after two minutes.
SV-239299r674826_ruleThe ESXi host must enable kernel core dumps.
SV-239300r674829_ruleThe ESXi host must enable a persistent log location for all locally stored logs.
SV-239301r674832_ruleThe ESXi host must configure NTP time synchronization.
SV-239302r674835_ruleThe ESXi Image Profile and vSphere Installation Bundle (VIB) Acceptance Levels must be verified.
SV-239303r674838_ruleThe ESXi host must protect the confidentiality and integrity of transmitted information by isolating vMotion traffic.
SV-239304r674841_ruleThe ESXi host must protect the confidentiality and integrity of transmitted information by protecting ESXi management traffic.
SV-239305r674844_ruleThe ESXi host must protect the confidentiality and integrity of transmitted information by isolating IP-based storage traffic.
SV-239306r674847_ruleThe ESXi host must protect the confidentiality and integrity of transmitted information by using different TCP/IP stacks where possible.
SV-239307r674850_ruleSNMP must be configured properly on the ESXi host.
SV-239308r674853_ruleThe ESXi host must enable bidirectional CHAP authentication for iSCSI traffic.
SV-239309r674856_ruleThe ESXi host must disable Inter-VM transparent page sharing.
SV-239310r674859_ruleThe ESXi host must configure the firewall to restrict access to services running on the host.
SV-239311r674862_ruleThe ESXi host must configure the firewall to block network traffic by default.
SV-239312r674865_ruleThe ESXi host must enable BPDU filter on the host to prevent being locked out of physical switch ports with Portfast and BPDU Guard enabled.
SV-239313r674868_ruleThe virtual switch Forged Transmits policy must be set to reject on the ESXi host.
SV-239314r674871_ruleThe virtual switch MAC Address Change policy must be set to reject on the ESXi host.
SV-239315r674874_ruleThe virtual switch Promiscuous Mode policy must be set to reject on the ESXi host.
SV-239316r674877_ruleThe ESXi host must prevent unintended use of the dvFilter network APIs.
SV-239317r674880_ruleFor the ESXi host, all port groups must be configured to a value other than that of the native VLAN.
SV-239318r674883_ruleFor the ESXi host, all port groups must not be configured to VLAN 4095 unless Virtual Guest Tagging (VGT) is required.
SV-239319r674886_ruleFor the ESXi host, all port groups must not be configured to VLAN values reserved by upstream physical switches.
SV-239320r674889_ruleFor physical switch ports connected to the ESXi host, the non-negotiate option must be configured for trunk links between external physical switches and virtual switches in Virtual Switch Tagging (VST) mode.
SV-239321r674892_ruleAll ESXi host-connected physical switch ports must be configured with spanning tree disabled.
SV-239322r674895_ruleAll ESXi host-connected virtual switch VLANs must be fully documented and have only the required VLANs.
SV-239323r674898_ruleThe ESXi host must not provide root/administrator-level access to CIM-based hardware monitoring tools or other third-party applications.
SV-239324r674901_ruleThe SA must verify the integrity of the installation media before installing ESXi.
SV-239325r674904_ruleThe ESXi host must have all security patches and updates installed.
SV-239326r674907_ruleThe ESXi host must exclusively enable TLS 1.2 for all endpoints.
SV-239327r674910_ruleThe ESXi host must enable Secure Boot.
SV-239328r674913_ruleThe ESXi host must use DoD-approved certificates.
SV-239329r674916_ruleThe ESXi host must not suppress warnings that the local or remote shell sessions are enabled.
SV-239330r674919_ruleThe ESXi host must centrally review and analyze audit records from multiple components within the system by configuring remote logging.
SV-239331r674922_ruleThe ESXi host SSH daemon must be configured to only use FIPS 140-2 approved ciphers.