Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
SRG-OS-99999-ESXI5-000159 | SRG-OS-99999-ESXI5-000159 | SRG-OS-99999-ESXI5-000159_rule | Low |
Description |
---|
Verify the ESXi Image Profile to only allow signed VIBs. An unsigned VIB represents untested code installed on an ESXi host. The ESXi Image profile supports four acceptance levels: (1) VMwareCertified - VIBs created, tested and signed by VMware; (2) VMwareAccepted - VIBs created by a VMware partner but tested and signed by VMware; (3) PartnerSupported - VIBs created, tested and signed by a certified VMware partner, and (4) CommunitySupported - VIBs that have not been tested by VMware or a VMware partner. Community Supported VIBs are not supported and do not have a digital signature. To protect the security and integrity of the ESXi hosts, unsigned (CommunitySupported) VIBs must not be installed. |
STIG | Date |
---|---|
VMware ESXi v5 Security Technical Implementation Guide | 2013-01-15 |
Check Text ( C-SRG-OS-99999-ESXI5-000159_chk ) |
---|
The downloaded ISO, offline bundle, or patch hash must be verified against the vendor's checksum to ensure the integrity and authenticity of the files. See some typical command line example(s) for both the md5 and sha1 hash check(s) directly below. # md5sum # sha1sum If any of the system's downloaded ISO, offline bundle, or system patch hashes cannot be verified against the vendor's checksum, this is a finding. |
Fix Text (F-SRG-OS-99999-ESXI5-000159_fix) |
---|
If the hash returned from the md5sum or sha1sum commands do not match the vendor's hash, the downloaded software must be discarded. If the physical media is obtained from VMware and the security seal is broken, the software must be returned to VMware for replacement. |