VMware NSX 4.x Manager NDM Security Technical Implementation Guide

Overview

VersionDateFinding Count (28)Downloads
12024-12-13CAT I (High): 6CAT II (Medium): 21CAT III (Low): 1
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - MAC I - Mission Critical Sensitive

Finding IDSeverityTitleDescription
V-265289
LOWMEDIUMHIGH
The NSX Manager must configure logging levels for services to ensure audit records are generated.Without generating audit records specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and in...
V-265293
LOWMEDIUMHIGH
The NSX Manager must be configured to enforce the limit of three consecutive invalid logon attempts, after which time it must block any login attempt for 15 minutes.By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, ...
V-265294
LOWMEDIUMHIGH
The NSX Manager must display the Standard Mandatory DOD Notice and Consent Banner before granting access.Display of the DOD-approved use notification before granting access to the network device ensures privacy and security notification verbiage used is c...
V-265295
LOWMEDIUMHIGH
The NSX Manager must retain the Standard Mandatory DOD Notice and Consent Banner on the screen until the administrator acknowledges the usage conditions and takes explicit actions to log on for further access.The banner must be acknowledged by the administrator prior to the device allowing the administrator access to the network device. This provides assura...
V-265313
LOWMEDIUMHIGH
The NSX Manager must be configured with only one local account to be used as the account of last resort in the event the authentication server is unavailable.Authentication for administrative (privileged level) access to the device is required at all times. An account can be created on the device's local da...
V-265316
LOWMEDIUMHIGH
The NSX Manager must enforce a minimum 15-character password length for local accounts.Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password ...
V-265317
LOWMEDIUMHIGH
The NSX Manager must enforce password complexity by requiring that at least one uppercase character be used for local accounts.Use of a complex passwords helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measur...
V-265318
LOWMEDIUMHIGH
The NSX Manager must enforce password complexity by requiring that at least one lowercase character be used for local accounts.Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure...
V-265319
LOWMEDIUMHIGH
The NSX Manager must enforce password complexity by requiring that at least one numeric character be used for local accounts.Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure...
V-265320
LOWMEDIUMHIGH
The NSX Manager must enforce password complexity by requiring that at least one special character be used for local accounts.Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure...
V-265321
LOWMEDIUMHIGH
The NSX Manager must require that when a password is changed, the characters are changed in at least eight of the positions within the password.If the application allows the user to consecutively reuse extensive portions of passwords, this increases the chances of password compromise by increa...
V-265338
LOWMEDIUMHIGH
The NSX Manager must be configured to synchronize internal information system clocks using redundant authoritative time sources.The loss of connectivity to a particular authoritative time source will result in the loss of time synchronization (free-run mode) and increasingly in...
V-265339
LOWMEDIUMHIGH
The NSX Manager must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC).If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analysis. Time stamps generate...
V-265346
LOWMEDIUMHIGH
The NSX Manager must be configured to protect against denial-of-service (DoS) attacks by limit the number of concurrent sessions to an organization-defined number.DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or m...
V-265350
LOWMEDIUMHIGH
The NSX Manager must be configured to conduct backups on an organizationally defined schedule.Information system backup is a critical step in maintaining data assurance and availability. Information system and security-related documentation con...
V-265351
LOWMEDIUMHIGH
The NSX Manager must obtain its public key certificates from an appropriate certificate policy through an approved service provider.For user certificates, each organization obtains certificates from an approved, shared service provider, as required by Office of Management and Budge...
V-265353
LOWMEDIUMHIGH
The NSX Manager must disable SSH.The NSX shell provides temporary access to commands essential for server maintenance. Intended primarily for use in break-fix scenarios, the NSX shell...
V-265354
LOWMEDIUMHIGH
The NSX Manager must disable SNMP v2.SNMPv3 supports commercial-grade security, including authentication, authorization, access control, and privacy. Previous versions of the protocol con...
V-265355
LOWMEDIUMHIGH
The NSX Manager must enable the global FIPS compliance mode for load balancers.If unsecured protocols (lacking cryptographic mechanisms) are used for load balancing, the contents of those sessions will be susceptible to eavesdrop...
V-265358
LOWMEDIUMHIGH
The NSX Manager must be configured as a cluster.Failure in a known state can address safety or security in accordance with the mission needs of the organization. Failure to a known secure state help...
V-265359
LOWMEDIUMHIGH
The NSX Managers must be deployed on separate physical hosts.SDN relies heavily on control messages between a controller and the forwarding devices for network convergence. The controller uses node and link stat...
V-265349
LOWMEDIUMHIGH
The NSX Manager must not provide environment information to third parties.Providing technical details about an environment's infrastructure to third parties could unknowingly expose sensitive information to bad actors if int...
V-265292
LOWMEDIUMHIGH
The NSX Manager must assign users/accounts to organization-defined roles configured with approved authorizations.The lack of authorization-based access control could result in the immediate compromise and unauthorized access to sensitive information. Users must b...
V-265296
LOWMEDIUMHIGH
The NSX Manager must be configured to integrate with an identity provider that supports multifactor authentication (MFA).Common attacks against single-factor authentication are attacks on user passwords. These attacks include brute force password guessing, password spray...
V-265315
LOWMEDIUMHIGH
The NSX Manager must only enable TLS 1.2 or greater.A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authenticator and the applicati...
V-265327
LOWMEDIUMHIGH
The NSX Manager must terminate all network connections associated with a session after five minutes of inactivity.Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take immediate control of a man...
V-265348
LOWMEDIUMHIGH
The NSX Manager must be configured to send logs to a central log server.Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information s...
V-265352
LOWMEDIUMHIGH
The NSX Manager must be running a release that is currently supported by the vendor.Network devices running an unsupported operating system lack current security fixes required to mitigate the risks associated with recent vulnerabilit...