UCF STIG Viewer Logo

The system must verify the integrity of the installation media before installing ESXi.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-OS-99999-ESXI5-000159 SRG-OS-99999-ESXI5-000159 SRG-OS-99999-ESXI5-000159_rule Low
Description
Verify the ESXi Image Profile to only allow signed VIBs. An unsigned VIB represents untested code installed on an ESXi host. The ESXi Image profile supports four acceptance levels: (1) VMwareCertified - VIBs created, tested and signed by VMware; (2) VMwareAccepted - VIBs created by a VMware partner but tested and signed by VMware; (3) PartnerSupported - VIBs created, tested and signed by a certified VMware partner, and (4) CommunitySupported - VIBs that have not been tested by VMware or a VMware partner. Community Supported VIBs are not supported and do not have a digital signature. To protect the security and integrity of the ESXi hosts, unsigned (CommunitySupported) VIBs must not be installed.
STIG Date
VMware ESXi v5 Security Technical Implementation Guide 2013-01-15

Details

Check Text ( C-SRG-OS-99999-ESXI5-000159_chk )

The downloaded ISO, offline bundle, or patch hash must be verified against the vendor's checksum to ensure the integrity and authenticity of the files.
See some typical command line example(s) for both the md5 and sha1 hash check(s) directly below.
# md5sum .iso
# sha1sum .iso

If any of the system's downloaded ISO, offline bundle, or system patch hashes cannot be verified against the vendor's checksum, this is a finding.

Fix Text (F-SRG-OS-99999-ESXI5-000159_fix)


If the hash returned from the md5sum or sha1sum commands do not match the vendor's hash, the downloaded software must be discarded.
If the physical media is obtained from VMware and the security seal is broken, the software must be returned to VMware for replacement.