UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Virtual Machine Manager Security Requirements Guide


Overview

Date Finding Count (195)
2024-05-28 CAT I (High): 0 CAT II (Med): 195 CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC II - Mission Support Sensitive)

Finding ID Severity Title
V-207512 Medium The VMM must generate audit records when successful/unsuccessful attempts to modify privileges occur.
V-207513 Medium The VMM must generate audit records when successful/unsuccessful attempts to modify security objects occur.
V-207510 Medium The VMM must generate audit records when successful/unsuccessful attempts to access security levels occur.
V-207511 Medium The VMM must generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur.
V-207358 Medium The VMM must alert the ISSO and SA (at a minimum) in the event of an audit processing failure.
V-207359 Medium The VMM must shut down by default upon audit failure (unless availability is an overriding concern).
V-207514 Medium The VMM must generate audit records when successful/unsuccessful attempts to modify security levels occur.
V-207515 Medium The VMM must generate audit records when successful/unsuccessful attempts to delete privileges occur.
V-207354 Medium The VMM must produce audit records containing information to establish where the events occurred.
V-207355 Medium The VMM must produce audit records containing information to establish the source of the events.
V-207356 Medium The VMM must produce audit records containing information to establish the outcome of the events.
V-207357 Medium The VMM must generate audit records containing the full-text recording of privileged commands or the individual identities of group account users.
V-207350 Medium The VMM must monitor remote access methods automatically.
V-207351 Medium The VMM must use DoD-approved encryption to protect the confidentiality of remote access sessions.
V-207352 Medium The VMM must produce audit records containing information to establish what type of events occurred.
V-207353 Medium The VMM must produce audit records containing information to establish when (date and time) the events occurred.
V-207453 Medium The VMM must off-load audit records onto a different system or media than the system being audited.
V-207452 Medium The VMM must allocate audit record storage capacity to store at least one weeks worth of audit records when audit records are not immediately sent to a central audit record storage facility.
V-207457 Medium The VMM must provide an audit reduction capability that supports after-the-fact investigations of security incidents.
V-207456 Medium The VMM must provide an audit reduction capability that supports on-demand audit review and analysis.
V-207455 Medium The VMM must provide an immediate real-time alert to the SA and ISSO, at a minimum, of all audit failure events requiring real-time alerts.
V-207454 Medium The VMM must provide an immediate warning to the SA and ISSO, at a minimum, when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity.
V-207516 Medium The VMM must generate audit records when successful/unsuccessful attempts to delete security levels occur.
V-207459 Medium The VMM must provide a report generation capability that supports on-demand reporting requirements.
V-207458 Medium The VMM must provide a report generation capability that supports on-demand audit review and analysis.
V-207517 Medium The VMM must generate audit records when successful/unsuccessful attempts to delete security objects occur.
V-207432 Medium The VMM must automatically terminate a user session after inactivity timeouts have expired or at shutdown.
V-207518 Medium The VMM must generate audit records when successful/unsuccessful logon attempts occur.
V-207505 Medium The VMM must remove all software components after updated versions have been installed.
V-264316 Medium The VMM must prohibit the use or connection of unauthorized hardware components.
V-264315 Medium The VMM must disable accounts when the accounts are no longer associated to a user.
V-207506 Medium The VMM must verify correct operation of all security functions.
V-207501 Medium The VMM must maintain the confidentiality and integrity of information during reception.
V-207500 Medium The VMM must maintain the confidentiality and integrity of information during preparation for transmission.
V-207349 Medium The VMM must conceal, via the session lock, information previously visible on the display with a publicly viewable image.
V-207348 Medium The VMM must provide the capability for users to directly initiate a session lock.
V-207347 Medium The VMM must initiate a session lock after a 15-minute period of inactivity.
V-207346 Medium The VMM must retain the session lock until the user reestablishes access using established identification and authentication procedures.
V-207345 Medium The VMM must limit the number of concurrent sessions to ten for all accounts and/or account types.
V-207344 Medium The VMM must retain the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access.
V-207343 Medium The VMM must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system.
V-207342 Medium The VMM must enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period.
V-207341 Medium The VMM must automatically audit account creation.
V-207340 Medium The VMM must automatically disable local accounts after a 35-day period of account inactivity.
V-207466 Medium The VMM must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
V-207467 Medium The VMM must enforce dual authorization for movement and/or deletion of all audit information, when such movement or deletion is not part of an authorized automatic process.
V-207464 Medium The VMM must synchronize internal information system clocks to the authoritative time source when the time difference is greater than one second.
V-207465 Medium The VMM must record time stamps for audit records that meet a granularity of one second for a minimum degree of precision.
V-207462 Medium The VMM that provides a report generation capability must not alter original content or time ordering of audit records.
V-207463 Medium The VMM must, for networked systems, compare internal information system clocks at least every 24 hours with a server which is synchronized to one of the redundant United States Naval Observatory (USNO) time servers or a time server designated for the appropriate DOD network (NIPRNet/SIPRNet), and/or the Global Positioning System (GPS).
V-207460 Medium The VMM must provide a report generation capability that supports after-the-fact investigations of security incidents.
V-207461 Medium The VMM that provides an audit reduction capability must not alter original content or time ordering of audit records.
V-207468 Medium The VMM must prohibit user installation of software without explicit privileged status.
V-207469 Medium The VMM must notify designated personnel if baseline configurations are changed in an unauthorized manner.
V-207372 Medium The VMM must enforce password complexity by requiring that at least one uppercase character be used.
V-207373 Medium The VMM must enforce password complexity by requiring that at least one lowercase character be used.
V-207370 Medium The VMM, for PKI-based authentication, must enforce authorized access to the corresponding private key.
V-207371 Medium The VMM must map the authenticated identity to the user or group account for PKI-based authentication.
V-207376 Medium The VMM must store only encrypted representations of passwords.
V-207377 Medium The VMM must transmit only encrypted representations of passwords.
V-207374 Medium The VMM must enforce password complexity by requiring that at least one numeric character be used.
V-207375 Medium The VMM must require the change of at least eight of the total number of characters when passwords are changed.
V-207471 Medium The VMM must audit the enforcement actions used to restrict access associated with changes to the system.
V-207470 Medium The VMM must enforce access restrictions associated with changes to the system.
V-207378 Medium The VMM must enforce 24 hours/one day as the minimum password lifetime.
V-207379 Medium The VMM must enforce a 60-day maximum password lifetime restriction.
V-207475 Medium The VMM must employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs and guest VMs.
V-207474 Medium The VMM must prevent inappropriate use of redundant guest VMs.
V-207360 Medium The VMM must support the capability to centrally review and analyze audit records from multiple components within the system.
V-207365 Medium The VMM must protect audit information from unauthorized deletion.
V-207364 Medium The VMM must protect audit information from unauthorized modification.
V-207367 Medium The VMM must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
V-207366 Medium The VMM must provide audit record generation capability for DoD-defined auditable events for all VMM components.
V-207361 Medium The VMM must support the capability to filter audit records for events of interest based upon all audit fields within audit records.
V-207409 Medium The VMM must check the validity of all data inputs except those specifically identified by the organization.
V-207363 Medium The VMM must protect audit information from unauthorized read access.
V-207362 Medium The VMM must use internal system clocks to generate time stamps for audit records.
V-207404 Medium The VMM must manage excess capacity, bandwidth, or other redundancy to limit the effects of information-flooding types of Denial of Service (DoS) attacks.
V-207405 Medium The VMM must terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity; and for user sessions (non-privileged session), the session must be terminated after 15 minutes of inactivity, except to fulfill documented and validated mission requirements.
V-207406 Medium The VMM must fail to a secure state if system initialization fails, shutdown fails, or aborts fail.
V-207407 Medium The VMM must protect the confidentiality and integrity of all information at rest.
V-207369 Medium The VMM, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.
V-207401 Medium The VMM must separate user functionality (including user interface services) from VMM management functionality.
V-207402 Medium The VMM must isolate security functions from non-security functions.
V-207368 Medium The VMM must generate audit records when successful/unsuccessful attempts to access privileges occur.
V-207403 Medium The VMM must prevent unauthorized and unintended information transfer via shared system resources.
V-207484 Medium The VMM must authenticate all endpoint devices before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based.
V-207486 Medium The VMM must prohibit the use of cached authenticators after one day.
V-207487 Medium The VMM, for PKI-based authentication, must implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.
V-207480 Medium The VMM must implement multifactor authentication for remote access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access.
V-207481 Medium The VMM must accept Personal Identity Verification (PIV) credentials.
V-207482 Medium The VMM must electronically verify Personal Identity Verification (PIV) credentials.
V-207483 Medium The VMM must authenticate peripherals before establishing a connection.
V-207488 Medium The VMM must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
V-207489 Medium The VMM must request data origin authentication verification on the name/address resolution responses the system receives from authoritative sources.
V-264322 Medium The VMM must accept only external credentials that are NIST-compliant.
V-264323 Medium The VMM must monitor the use of maintenance tools that execute with increased privilege.
V-264320 Medium The VMM must for password-based authentication, allow user selection of long passwords and passphrases, including spaces and all printable characters.
V-264321 Medium The VMM must for password-based authentication, employ automated tools to assist the user in selecting strong password authenticators.
V-264326 Medium The VMM must synchronize system clocks within and between systems or system components.
V-264327 Medium The VMM must employ automated patch management tools to facilitate flaw remediation to the organization-defined system components.
V-264324 Medium The VMM must include only approved trust anchors in trust stores or certificate stores managed by the organization.
V-264325 Medium The VMM must provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store.
V-207419 Medium The VMM must initiate session audits at system startup.
V-207418 Medium The VMM must implement cryptography to protect the integrity of remote access sessions.
V-207417 Medium All interactions between guest VMs and external systems, via other interface devices, must be mediated by the VMM or its service VMs.
V-207416 Medium All guest VM network communications must be implemented through use of virtual network devices provisioned by the VMM.
V-207415 Medium The VMM must automatically audit account removal actions.
V-207414 Medium The VMM must automatically audit account disabling actions.
V-207413 Medium The VMM must automatically audit account modification.
V-207412 Medium All interactions among guest VMs must be mediated by the VMM or its service VMs to support proper function.
V-207411 Medium The VMM must reveal system error messages only to authorized users.
V-207410 Medium The VMM must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
V-207396 Medium The VMM must use mechanisms meeting the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.
V-207519 Medium The VMM must generate audit records for privileged activities or other system-level access.
V-207397 Medium The VMM must support an audit reduction capability that supports on-demand reporting requirements.
V-207398 Medium The VMM must automatically remove or disable emergency accounts after the crisis is resolved or 72 hours.
V-207399 Medium The VMM must employ strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions.
V-207495 Medium The VMM must implement cryptographic mechanisms to prevent unauthorized disclosure of all information at rest on all VMM components.
V-207494 Medium The VMM must implement cryptographic mechanisms to prevent unauthorized modification of all information at rest on all VMM components.
V-207493 Medium The VMM must only allow the use of DoD PKI-established certificate authorities for verification of the establishment of protected sessions.
V-207492 Medium The VMM must perform data origin verification authentication on the name/address resolution responses the system receives from authoritative sources.
V-207491 Medium The VMM must perform data integrity verification on the name/address resolution responses the system receives from authoritative sources.
V-207490 Medium The VMM must request data integrity verification on the name/address resolution responses the system receives from authoritative sources.
V-207390 Medium The VMM must use multifactor authentication for local access to nonprivileged accounts.
V-207391 Medium The VMM must require individuals to be authenticated with an individual authenticator prior to using a group authenticator.
V-207392 Medium The VMM must implement replay-resistant authentication mechanisms for network access to privileged accounts.
V-207393 Medium The VMM must implement replay-resistant authentication mechanisms for network access to nonprivileged accounts.
V-207394 Medium The VMM must uniquely identify peripherals before establishing a connection.
V-207395 Medium The VMM must disable local account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.
V-207499 Medium The VMM must protect the confidentiality and integrity of transmitted information.
V-207498 Medium The VMM must protect against or limit the effects of Denial of Service (DoS) attacks by ensuring the VMM is implementing rate-limiting measures on impacted network interfaces.
V-207473 Medium The VMM must prevent use of service and helper VMs not required to support proper VMM function.
V-207422 Medium The VMM must protect audit tools from unauthorized modification.
V-207423 Medium The VMM must protect audit tools from unauthorized deletion.
V-207420 Medium The VMM must produce audit records containing information to establish the identity of any individual or process associated with the event.
V-207472 Medium The VMM must prevent the installation of guest VMs, patches, service packs, device drivers, or VMM components without verification they have been digitally signed using a certificate that is recognized and approved by the organization.
V-207426 Medium In the event of a system failure, the VMM must preserve any information necessary to determine cause of failure and any information necessary to return to operations with least disruption to mission processes.
V-207427 Medium The VMM must notify system administrators (SAs) and information system security officers (ISSOs) when accounts are created.
V-207424 Medium The VMM must limit privileges to change software resident within software libraries.
V-207425 Medium The VMM must enforce password complexity by requiring that at least one special character be used.
V-207428 Medium The VMM must notify the system administrator (SA) and information system security officer (ISSO) when accounts are modified.
V-207429 Medium The VMM must notify the system administrator (SA) and information system security officer (ISSO) when accounts are disabled.
V-207438 Medium The VMM must protect wireless access to the system using authentication of users and/or devices.
V-207497 Medium The VMM must maintain a separate execution domain for each guest VM.
V-207389 Medium The VMM must use multifactor authentication for local access to privileged accounts.
V-207388 Medium The VMM must use multifactor authentication for network access to non-privileged accounts.
V-207383 Medium The VMM must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
V-207382 Medium The VMM must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.
V-207381 Medium The VMM must enforce a minimum 15-character password length.
V-207387 Medium The VMM must use multifactor authentication for network access to privileged accounts.
V-207386 Medium The VMM must uniquely identify and must authenticate organizational users (or processes acting on behalf of organizational users).
V-207385 Medium The VMM must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
V-207384 Medium The VMM must be configured to disable non-essential capabilities.
V-207496 Medium The VMM must maintain a separate execution domain for each executing process.
V-207435 Medium The VMM must control remote access methods.
V-207434 Medium The VMM must display an explicit logout message to users indicating the reliable termination of authenticated communications sessions.
V-207437 Medium The VMM must protect wireless access to the system using encryption.
V-207436 Medium The VMM must provide the capability to immediately disconnect or disable remote access to the information system.
V-207431 Medium The VMM must use cryptographic mechanisms to protect the integrity of audit tools.
V-207430 Medium The VMM must notify the system administrator (SA) and information system security officer (ISSO) when accounts are removed.
V-207433 Medium VMMs requiring user access authentication must provide a logout capability for user-initiated communications sessions.
V-207504 Medium The VMM must implement address space layout randomization to protect its memory from unauthorized code execution.
V-207439 Medium The VMM must automatically audit account enabling actions.
V-207507 Medium The VMM must perform verification of the correct operation of security functions: upon system startup and/or restart; upon command by a user with privileged access; and/or every 30 days.
V-207421 Medium The VMM must protect audit tools from unauthorized access.
V-207338 Medium The VMM must provide automated mechanisms for supporting account management functions.
V-207339 Medium The VMM must automatically remove or disable local temporary user accounts after 72 hours.
V-207503 Medium The VMM must implement non-executable data to protect its memory from unauthorized code execution.
V-264318 Medium The VMM must for password-based authentication, verify when users create or update passwords the passwords are not found on the list of commonly-used, expected, or compromised passwords in ia-5 (1) (a).
V-207502 Medium The VMM must behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.
V-207529 Medium The VMM must protect the confidentiality and integrity of communications with wireless peripherals.
V-207528 Medium The VMM must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
V-207527 Medium The VMM must, at a minimum, off-load interconnected systems in real time and off-load standalone systems weekly.
V-207526 Medium The VMM must implement NIST FIPS-validated cryptography for the following: to provision digital signatures; to generate cryptographic hashes; and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
V-207525 Medium The VMM must generate audit records for all module load, unload, and restart actions, and also for all program and guest VM initiations.
V-207524 Medium The VMM must generate audit records for all account creations, modifications, disabling, and termination events.
V-207523 Medium The VMM must generate audit records for all direct access to the VMM.
V-207522 Medium The VMM must generate audit records when successful/unsuccessful accesses to objects occur.
V-207521 Medium The VMM must generate audit records when concurrent logons from different workstations occur.
V-207520 Medium The VMM must generate audit records showing starting and ending time for user access to the system.
V-207440 Medium The VMM must notify the system administrator (SA) and information system security officer (ISSO) of account enabling actions.
V-207441 Medium The VMM must implement discretionary access controls to allow VMM admins to pass information to any other VMM admin, user, or guest VM.
V-207442 Medium The VMM must implement discretionary access controls to allow VMM admins to grant their privileges to other VMM admins.
V-207443 Medium The VMM must implement discretionary access controls to allow VMM admins to change security attributes on users, guest VMs, the VMM, or the VMMs components.
V-207444 Medium The VMM must implement discretionary access controls to allow VMM admins to choose the security attributes to be associated with newly created or revised guest VMs.
V-207445 Medium The VMM must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
V-207446 Medium The VMM must prevent all software from executing at higher privilege levels than users executing the software.
V-207447 Medium The VMM must audit the execution of privileged functions.
V-207448 Medium The VMM must automatically lock an account until the locked account is released by an administrator, when three unsuccessful logon attempts in 15 minutes are made.
V-207449 Medium The VMM must provide the capability for assigned IMOs/ISSOs or designated SAs to change the auditing to be performed on all VMM components, based on all selectable event criteria in near real time.
V-207508 Medium The VMM must shut down, restart, and/or notify the system administrator when anomalies in the operation of any security functions are discovered.
V-264317 Medium The VMM must implement multifactor authentication for local, network, and/or remote access to privileged accounts and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements.
V-207509 Medium The VMM must generate audit records when successful/unsuccessful attempts to access security objects occur.
V-264319 Medium The VMM must for password-based authentication, require immediate selection of a new password upon account recovery.