UCF STIG Viewer Logo

VMware vSphere 7.0 Virtual Machine Security Technical Implementation Guide


Overview

Date Finding Count (28)
2023-12-01 CAT I (High): 0 CAT II (Med): 19 CAT III (Low): 9
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-256469 Medium Use of the virtual machine (VM) console must be minimized.
V-256464 Medium Unauthorized removal, connection, and modification of devices must be prevented on the virtual machine (VM).
V-256465 Medium The virtual machine (VM) must not be able to obtain host information from the hypervisor.
V-256460 Medium Unauthorized serial devices must be disconnected on the virtual machine (VM).
V-256461 Medium Unauthorized USB devices must be disconnected on the virtual machine (VM).
V-256462 Medium Console connection sharing must be limited on the virtual machine (VM).
V-256459 Medium Unauthorized parallel devices must be disconnected on the virtual machine (VM).
V-256455 Medium Independent, nonpersistent disks must not be used on the virtual machine (VM).
V-256454 Medium Virtual disk wiping must be disabled on the virtual machine (VM).
V-256457 Medium Unauthorized floppy devices must be disconnected on the virtual machine (VM).
V-256456 Medium Host Guest File System (HGFS) file transfers must be disabled on the virtual machine (VM).
V-256453 Medium Virtual disk shrinking must be disabled on the virtual machine (VM).
V-256477 Medium Encryption must be enabled for Fault Tolerance on the virtual machine (VM).
V-256476 Medium DirectPath I/O must be disabled on the virtual machine (VM) when not required.
V-256475 Medium Log retention must be configured properly on the virtual machine (VM).
V-256474 Medium Log size must be configured properly on the virtual machine (VM).
V-256473 Medium Logging must be enabled on the virtual machine (VM).
V-256472 Medium Encryption must be enabled for vMotion on the virtual machine (VM).
V-256470 Medium The virtual machine (VM) guest operating system must be locked when the last console connection is closed.
V-256468 Low System administrators must use templates to deploy virtual machines (VMs) whenever possible.
V-256466 Low Shared salt values must be disabled on the virtual machine (VM).
V-256467 Low Access to virtual machines (VMs) through the "dvfilter" network Application Programming Interface (API) must be controlled.
V-256463 Low Informational messages from the virtual machine to the VMX file must be limited on the virtual machine (VM).
V-256458 Low Unauthorized CD/DVD devices must be disconnected on the virtual machine (VM).
V-256451 Low Drag and drop operations must be disabled on the virtual machine (VM).
V-256450 Low Copy operations must be disabled on the virtual machine (VM).
V-256452 Low Paste operations must be disabled on the virtual machine (VM).
V-256471 Low All 3D features on the virtual machine (VM) must be disabled when not required.