UCF STIG Viewer Logo

VMware vSphere 7.0 vCenter Security Technical Implementation Guide


Overview

Date Finding Count (57)
2023-12-21 CAT I (High): 2 CAT II (Med): 53 CAT III (Low): 2
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-256331 High The vCenter Server must enable FIPS-validated cryptography.
V-256318 High The vCenter Server must use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data during electronic dissemination using remote access.
V-256364 Medium The vCenter Server must restrict access to the default roles with cryptographic permissions.
V-256349 Medium The vCenter Server must set the distributed port group Media Access Control (MAC) Address Change policy to "Reject".
V-256348 Medium The vCenter Server must set the distributed port group Forged Transmits policy to "Reject".
V-256352 Medium The vCenter Server must configure all port groups to a value other than that of the native virtual local area network (VLAN).
V-256353 Medium The vCenter Server must not configure VLAN Trunking unless Virtual Guest Tagging (VGT) is required and authorized.
V-256350 Medium The vCenter Server must set the distributed port group Promiscuous Mode policy to "Reject".
V-256351 Medium The vCenter Server must only send NetFlow traffic to authorized collectors.
V-256356 Medium The vCenter Server must configure the "vpxuser" password to meet length policy.
V-256357 Medium The vCenter Server must be isolated from the public internet but must still allow for patch notification and delivery.
V-256354 Medium The vCenter Server must not configure all port groups to virtual local area network (VLAN) values reserved by upstream physical switches.
V-256355 Medium The vCenter Server must configure the "vpxuser" auto-password to be changed every 30 days.
V-256374 Medium vCenter Native Key Providers must be backed up with a strong password.
V-256358 Medium The vCenter Server must use unique service accounts when applications connect to vCenter.
V-256359 Medium The vCenter Server must protect the confidentiality and integrity of transmitted information by isolating Internet Protocol (IP)-based storage traffic.
V-256370 Medium The vCenter Server must limit membership to the "SystemConfiguration.BashShellAdministrators" Single Sign-On (SSO) group.
V-256371 Medium The vCenter Server must limit membership to the "TrustedAdmins" Single Sign-On (SSO) group.
V-256372 Medium The vCenter server configuration must be backed up on a regular basis.
V-256373 Medium vCenter task and event retention must be set to at least 30 days.
V-256330 Medium The vCenter Server passwords must contain at least one special character.
V-256332 Medium The vCenter Server must enforce a 60-day maximum password lifetime restriction.
V-256333 Medium The vCenter Server must enable revocation checking for certificate-based authentication.
V-256334 Medium The vCenter Server must terminate vSphere Client sessions after 10 minutes of inactivity.
V-256335 Medium The vCenter Server users must have the correct roles assigned.
V-256336 Medium The vCenter Server must manage excess capacity, bandwidth, or other redundancy to limit the effects of information flooding types of denial-of-service (DoS) attacks by enabling Network I/O Control (NIOC).
V-256337 Medium The vCenter Server must provide an immediate real-time alert to the system administrator (SA) and information system security officer (ISSO), at a minimum, on every Single Sign-On (SSO) account action.
V-256338 Medium The vCenter Server must set the interval for counting failed login attempts to at least 15 minutes.
V-256339 Medium The vCenter Server must be configured to send logs to a central log server.
V-256319 Medium The vCenter Server must enforce the limit of three consecutive invalid login attempts by a user.
V-256343 Medium The vCenter Server must disable the Customer Experience Improvement Program (CEIP).
V-256345 Medium The vCenter server must disable SNMPv1/2 receivers.
V-256344 Medium The vCenter server must enforce SNMPv3 security features where SNMP is required.
V-256346 Medium The vCenter Server must require an administrator to unlock an account locked due to excessive login failures.
V-256341 Medium The vCenter Server must compare internal information system clocks at least every 24 hours with an authoritative time server.
V-256340 Medium vCenter must provide an immediate real-time alert to the system administrator (SA) and information system security officer (ISSO), at a minimum, of all audit failure events requiring real-time alerts.
V-256369 Medium The vCenter Server must use a limited privilege account when adding a Lightweight Directory Access Protocol (LDAP) identity source.
V-256368 Medium The vCenter Server must use secure Lightweight Directory Access Protocol (LDAPS) when adding an LDAP identity source.
V-256367 Medium The vCenter Server must have new Key Encryption Keys (KEKs) reissued at regular intervals for vSAN encrypted datastore(s).
V-256366 Medium The vCenter Server must have Mutual Challenge Handshake Authentication Protocol (CHAP) configured for vSAN Internet Small Computer System Interface (iSCSI) targets.
V-256365 Medium The vCenter Server must restrict access to cryptographic permissions.
V-256342 Medium The vCenter Server Machine Secure Sockets Layer (SSL) certificate must be issued by a DOD certificate authority.
V-256362 Medium The vCenter Server must configure the vSAN Datastore name to a unique name.
V-256361 Medium The vCenter Server must disable or restrict the connectivity between vSAN Health Check and public Hardware Compatibility List (HCL) by use of an external proxy server.
V-256360 Medium The vCenter server must be configured to send events to a central log server.
V-256323 Medium The vCenter Server must uniquely identify and authenticate users or processes acting on behalf of users.
V-256322 Medium vCenter Server plugins must be verified.
V-256321 Medium The vCenter Server must produce audit records containing information to establish what type of events occurred.
V-256320 Medium The vCenter Server must display the Standard Mandatory DOD Notice and Consent Banner before login.
V-256327 Medium The vCenter Server passwords must contain at least one uppercase character.
V-256326 Medium The vCenter Server must prohibit password reuse for a minimum of five generations.
V-256325 Medium The vCenter Server passwords must be at least 15 characters in length.
V-256324 Medium The vCenter Server must require multifactor authentication.
V-256329 Medium The vCenter Server passwords must contain at least one numeric character.
V-256328 Medium The vCenter Server passwords must contain at least one lowercase character.
V-256347 Low The vCenter Server must disable the distributed virtual switch health check.
V-256363 Low The vCenter Server must disable Username/Password and Windows Integrated Authentication.