UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The operating system must protect against or must limit the effects of the organization-defined or referenced types of Denial of Service attacks.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-OS-000140-ESXI5-PF SRG-OS-000140-ESXI5-PF SRG-OS-000140-ESXI5-PF_rule Medium
Description
A variety of technologies exist to limit, or in some cases, eliminate the effects of Denial of Service attacks. Employing increased capacity combined with service redundancy may reduce the susceptibility to some Denial of Service attacks. Permanent finding - Virtual machines are the containers in which applications and guest operating systems run. By design, all VMware virtual machines are isolated from one another. This isolation enables multiple virtual machines to run securely while sharing hardware, and ensures both their ability to access hardware and their uninterrupted performance. Even a user with system administrator privileges on a virtual machine's guest operating system cannot breach this layer of isolation to access another virtual machine without privileges explicitly granted by the ESXi system administrator. As a result of virtual machine isolation, if a guest operating system running in a virtual machine fails, other virtual machines on the same host continue to run. The guest operating system failure has no effect on: the ability of users to access the other virtual machines, the ability of the operational virtual machines to access the resources they need, or the performance of the other virtual machines. VMs are not aware of other VMs or that they even are VMs.
STIG Date
VMware ESXi v5 Security Technical Implementation Guide 2013-01-15

Details

Check Text ( C-SRG-OS-000140-ESXI5-PF_chk )
ESXi does not support this requirement. This is a permanent finding.
Fix Text (F-SRG-OS-000140-ESXI5-PF_fix)
This requirement is a permanent finding and cannot be fixed. An appropriate mitigation for the system must be implemented but this finding cannot be considered fixed.