UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

VMware vSphere 6.5 ESXi Security Technical Implementation Guide


Overview

Date Finding Count (86)
2019-10-01 CAT I (High): 6 CAT II (Med): 52 CAT III (Low): 28
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via e-mail to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-93977 High The ESXi host SSH daemon must not allow authentication using an empty password.
V-93969 High The ESXi host SSH daemon must be configured to use only the SSHv2 protocol.
V-94041 High The ESXi Image Profile and VIB Acceptance Levels must be verified.
V-94479 High The ESXi host must have all security patches and updates installed.
V-94477 High The ESXi host must verify the integrity of the installation media before installing ESXi.
V-94067 High The virtual switch MAC Address Change policy must be set to reject on the ESXi host.
V-94019 Medium The ESXi host must disable ESXi Shell unless needed for diagnostics or troubleshooting.
V-94017 Medium The ESXi host must be configured to disable non-essential capabilities by disabling SSH.
V-94013 Medium The password hashes stored on the ESXi host must have been generated using a FIPS 140-2 approved cryptographic hashing algorithm.
V-94015 Medium The ESXi host must disable the Managed Object Browser (MOB).
V-94029 Medium The ESXi host must set a timeout to automatically disable idle sessions after 10 minutes.
V-94545 Medium The ESXi host must implement replay-resistant authentication mechanisms for network access to non-privileged accounts by using the vSphere Authentication Proxy.
V-93949 Medium The ESXi host must limit the number of concurrent sessions to ten for all accounts and/or account types by enabling lockdown mode.
V-94531 Medium The ESXi host must implement replay-resistant authentication mechanisms for network access to privileged accounts by using the vSphere Authentication Proxy.
V-94011 Medium The ESXi host must prohibit the reuse of passwords within five iterations.
V-93959 Medium The ESXi host must enforce the unlock timeout of 15 minutes after a user account is locked out.
V-93955 Medium Remote logging for ESXi hosts must be configured.
V-93957 Medium The ESXi host must enforce the limit of three consecutive invalid logon attempts by a user.
V-94507 Medium The ESXi host must require individuals to be authenticated with an individual authenticator prior to using a group authenticator by using the vSphere Authentication Proxy.
V-93961 Medium The ESXi host must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system.
V-93963 Medium The ESXi host must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system.
V-93971 Medium The ESXi host SSH daemon must ignore .rhosts files.
V-93965 Medium The ESXi host SSH daemon must be configured with the Department of Defense (DoD) login banner.
V-93967 Medium The ESXi host SSH daemon must use DoD-approved encryption to protect the confidentiality of remote access sessions.
V-94037 Medium The ESXi host must enable a persistent log location for all locally stored logs.
V-94033 Medium The ESXi host must logout of the console UI after 10 minutes.
V-94031 Medium The ESXi host must terminate shell services after 10 minutes.
V-94039 Medium The ESXi host must configure NTP time synchronization.
V-94349 Medium The ESXi host must not provide root/administrator level access to CIM-based hardware monitoring tools or other third-party applications.
V-94043 Medium The ESXi host must protect the confidentiality and integrity of transmitted information by isolating vMotion traffic.
V-94047 Medium The ESXi host must protect the confidentiality and integrity of transmitted information by protecting IP based management traffic.
V-93989 Medium The ESXi host SSH daemon must not allow compression or must only allow compression after successful authentication.
V-93981 Medium The ESXi host SSH daemon must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.
V-93987 Medium The ESXi host SSH daemon must perform strict mode checking of home directory configuration files.
V-94053 Medium SNMP must be configured properly on the ESXi host.
V-93973 Medium The ESXi host SSH daemon must not allow host-based authentication.
V-94059 Medium The ESXi host must configure the firewall to restrict access to services running on the host.
V-93979 Medium The ESXi host SSH daemon must not permit user environment settings.
V-93993 Medium The ESXi host SSH daemon must be configured to not allow X11 forwarding.
V-93995 Medium The ESXi host SSH daemon must not accept environment variables from the client.
V-93997 Medium The ESXi host SSH daemon must not permit tunnels.
V-94069 Medium The virtual switch Promiscuous Mode policy must be set to reject on the ESXi host.
V-94065 Medium The virtual switch Forged Transmits policy must be set to reject on the ESXi host.
V-94061 Medium The ESXi host must configure the firewall to block network traffic by default.
V-94023 Medium The ESXi host must use the vSphere Authentication Proxy to protect passwords when adding ESXi hosts to Active Directory.
V-94009 Medium The ESXi host must enforce password complexity by requiring that at least one upper-case character be used.
V-94005 Medium The ESXi host must remove keys from the SSH authorized_keys file.
V-94003 Medium The ESXi host SSH daemon must limit connections to a single session.
V-94083 Medium All ESXi host-connected virtual switch VLANs must be fully documented and have only the required VLANs.
V-94483 Medium The ESXi host must exclusively enable TLS 1.2 for the ioFilter, vSANVP and reverse proxy services.
V-94481 Medium The ESXi host must enable TLS 1.2 exclusively for the SFCB service.
V-94487 Medium The ESXi host must enable Secure Boot.
V-94489 Medium The ESXi host must use DoD-approved certificates.
V-94079 Medium For physical switch ports connected to the ESXi host, the non-negotiate option must be configured for trunk links between external physical switches and virtual switches in VST mode.
V-94073 Medium For the ESXi host all port groups must be configured to a value other than that of the native VLAN.
V-94071 Medium The ESXi host must prevent unintended use of the dvFilter network APIs.
V-94077 Medium For the ESXi host all port groups must not be configured to VLAN values reserved by upstream physical switches.
V-94075 Medium For the ESXi host all port groups must not be configured to VLAN 4095 unless Virtual Guest Tagging (VGT) is required.
V-94549 Low The ESXi host must only allow the use of DoD PKI-established certificate authorities for verification of the establishment of protected sessions.
V-94547 Low The ESXi host must implement replay-resistant authentication mechanisms for network access to non-privileged accounts by restricting use of Active Directory ESX Admin group membership.
V-94543 Low The ESXi host must implement replay-resistant authentication mechanisms for network access to non-privileged accounts by using Active Directory for local user authentication.
V-94533 Low The ESXi host must implement replay-resistant authentication mechanisms for network access to privileged accounts by restricting use of Active Directory ESX Admin group membership.
V-94025 Low Active Directory ESX Admin group membership must not be used when adding ESXi hosts to Active Directory.
V-94535 Low The ESXi host must electronically verify Personal Identity Verification (PIV) credentials.
V-94529 Low The ESXi host must implement replay-resistant authentication mechanisms for network access to privileged accounts by using Active Directory for local user authentication.
V-93951 Low The ESXi host must verify the DCUI.Access list.
V-93953 Low The ESXi host must verify the exception users list for lockdown mode.
V-93975 Low The ESXi host SSH daemon must not permit root logins.
V-94055 Low The ESXi host must enable bidirectional CHAP authentication for iSCSI traffic.
V-94035 Low The ESXi host must enable kernel core dumps.
V-94505 Low The ESXi host must require individuals to be authenticated with an individual authenticator prior to using a group authenticator by using Active Directory for local user authentication.
V-94511 Low The ESXi host must accept Personal Identity Verification (PIV) credentials.
V-94049 Low The ESXi host must protect the confidentiality and integrity of transmitted information.
V-93983 Low The ESXi host SSH daemon must not permit GSSAPI authentication.
V-93985 Low The ESXi host SSH daemon must not permit Kerberos authentication.
V-94051 Low The ESXi host must protect the confidentiality and integrity of transmitted information by utilizing different TCP/IP stacks where possible.
V-94057 Low The ESXi host must disable Inter-VM transparent page sharing.
V-94509 Low The ESXi host must require individuals to be authenticated with an individual authenticator prior to using a group authenticator by restricting use of Active Directory ESX Admin group membership.
V-93999 Low The ESXi host SSH daemon must set a timeout count on idle sessions.
V-93991 Low The ESXi host SSH daemon must be configured to not allow gateway ports.
V-94021 Low The ESXi host must use Active Directory for local user authentication.
V-94063 Low The ESXi host must enable BPDU filter on the host to prevent being locked out of physical switch ports with Portfast and BPDU Guard enabled.
V-94007 Low The ESXi host must produce audit records containing information to establish what type of events occurred.
V-94001 Low The ESXi hostSSH daemon must set a timeout interval on idle sessions.
V-94027 Low The ESXi host must use multifactor authentication for local access to privileged accounts.
V-94081 Low All ESXi host-connected physical switch ports must be configured with spanning tree disabled.