UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

VMware vSphere 7.0 Virtual Machine Security Technical Implementation Guide


Overview

Date Finding Count (28)
2023-12-01 CAT I (High): 0 CAT II (Med): 19 CAT III (Low): 9
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-256469 Medium Use of the virtual machine (VM) console must be minimized.
V-256464 Medium Unauthorized removal, connection, and modification of devices must be prevented on the virtual machine (VM).
V-256465 Medium The virtual machine (VM) must not be able to obtain host information from the hypervisor.
V-256460 Medium Unauthorized serial devices must be disconnected on the virtual machine (VM).
V-256461 Medium Unauthorized USB devices must be disconnected on the virtual machine (VM).
V-256462 Medium Console connection sharing must be limited on the virtual machine (VM).
V-256459 Medium Unauthorized parallel devices must be disconnected on the virtual machine (VM).
V-256455 Medium Independent, nonpersistent disks must not be used on the virtual machine (VM).
V-256454 Medium Virtual disk wiping must be disabled on the virtual machine (VM).
V-256457 Medium Unauthorized floppy devices must be disconnected on the virtual machine (VM).
V-256456 Medium Host Guest File System (HGFS) file transfers must be disabled on the virtual machine (VM).
V-256453 Medium Virtual disk shrinking must be disabled on the virtual machine (VM).
V-256477 Medium Encryption must be enabled for Fault Tolerance on the virtual machine (VM).
V-256476 Medium DirectPath I/O must be disabled on the virtual machine (VM) when not required.
V-256475 Medium Log retention must be configured properly on the virtual machine (VM).
V-256474 Medium Log size must be configured properly on the virtual machine (VM).
V-256473 Medium Logging must be enabled on the virtual machine (VM).
V-256472 Medium Encryption must be enabled for vMotion on the virtual machine (VM).
V-256470 Medium The virtual machine (VM) guest operating system must be locked when the last console connection is closed.
V-256468 Low System administrators must use templates to deploy virtual machines (VMs) whenever possible.
V-256466 Low Shared salt values must be disabled on the virtual machine (VM).
V-256467 Low Access to virtual machines (VMs) through the "dvfilter" network Application Programming Interface (API) must be controlled.
V-256463 Low Informational messages from the virtual machine to the VMX file must be limited on the virtual machine (VM).
V-256458 Low Unauthorized CD/DVD devices must be disconnected on the virtual machine (VM).
V-256451 Low Drag and drop operations must be disabled on the virtual machine (VM).
V-256450 Low Copy operations must be disabled on the virtual machine (VM).
V-256452 Low Paste operations must be disabled on the virtual machine (VM).
V-256471 Low All 3D features on the virtual machine (VM) must be disabled when not required.