V-63263 | High | The Image Profile and VIB Acceptance Levels must be verified. | Verify the ESXi Image Profile to only allow signed VIBs. An unsigned VIB represents untested code installed on an ESXi host. The ESXi Image profile supports four acceptance levels:
(1)... |
V-63311 | High | The system must verify the integrity of the installation media before installing ESXi. | Always check the SHA1 hash after downloading an ISO, offline bundle, or patch to ensure integrity and authenticity of the downloaded files. |
V-63313 | High | The system must have all security patches and updates installed. | Installing software updates is a fundamental mitigation against the exploitation of publicly-known vulnerabilities. |
V-63289 | High | The virtual switch MAC Address Change policy must be set to reject. | If the virtual machine operating system changes the MAC address, it can send frames with an impersonated source MAC address at any time. This allows it to stage malicious attacks on the devices in... |
V-63901 | High | The VMM must implement cryptographic mechanisms to prevent unauthorized modification of all information at rest on all VMM components by verifying Image Profile and VIP Acceptance Levels. | Verify the ESXi Image Profile to only allow signed VIBs. An unsigned VIB represents untested code installed on an ESXi host. The ESXi Image profile supports four acceptance levels:
(1)... |
V-63191 | High | The SSH daemon must be configured to use only the SSHv2 protocol. | SSH protocol version 1 suffers from design flaws that result in security vulnerabilities and should not be used. |
V-63199 | High | The SSH daemon must not allow authentication using an empty password. | Configuring this setting for the SSH daemon provides additional assurance that remote login via SSH will require a password, even in the event of misconfiguration elsewhere. |
V-63823 | High | The VMM must employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs and guest VMs by verifying Image Profile and VIP Acceptance Levels. | Verify the ESXi Image Profile to only allow signed VIBs. An unsigned VIB represents untested code installed on an ESXi host. The ESXi Image profile supports four acceptance levels:
(1)... |
V-63147 | Medium | The VMM must limit the number of concurrent sessions to ten for all accounts and/or account types by enabling lockdown mode. | Enabling lockdown mode disables direct access to an ESXi host requiring the host be managed remotely from vCenter Server. This is done to ensure the roles and access controls implemented in... |
V-63259 | Medium | The system must enable a persistent log location for all locally stored logs. | ESXi can be configured to store log files on an in-memory file system. This occurs when the host's "/scratch" directory is linked to "/tmp/scratch". When this is done only a single day's worth of... |
V-63255 | Medium | The system must logout of the console UI after a predetermined period. | When the Direct console user interface (DCUI) is enabled and logged in it should be automatically logged out if left logged in to avoid unauthorized privilege gains. The DcuiTimeOut defines a... |
V-63251 | Medium | The system must set a timeout to automatically disable idle sessions after a predetermined period. | If a user forgets to log out of their SSH session, the idle connection will remains open indefinitely, increasing the potential for someone to gain privileged access to the host. The... |
V-63253 | Medium | The system must terminate shell services after a predetermined period. | When the ESXi Shell or SSH services are enabled on a host they will run indefinitely. To avoid having these services left running set the ESXiShellTimeOut. The ESXiShellTimeOut defines a window... |
V-63867 | Medium | The VMM must enforce password complexity by requiring that at least one numeric character be used. | To enforce the use of complex passwords, minimum numbers of characters of different classes are mandated. The use of complex passwords reduces the ability of attackers to successfully obtain valid... |
V-63485 | Medium | The VMM must retain the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access. | Failure to display the DoD logon banner prior to a log in attempt will negate legal proceedings resulting from unauthorized access to system resources. |
V-63269 | Medium | The system must protect the confidentiality and integrity of transmitted information by protecting IP based management traffic. | Virtual machines might share virtual switches and VLANs with the IP-based storage configurations. IP-based storage includes iSCSI and NFS. This configuration might expose IP-based storage traffic... |
V-63177 | Medium | Remote logging for ESXi hosts must be configured. | Remote logging to a central log host provides a secure, centralized store for ESXi logs. By gathering host log files onto a central host it can more easily monitor all hosts with a single tool. It... |
V-63179 | Medium | The system must enforce the limit of three consecutive invalid logon attempts by a user. | By limiting the number of failed login attempts, the risk of unauthorized access via user password guessing, otherwise known as brute-forcing, is reduced. Limits are imposed by locking the account. |
V-63265 | Medium | The system must protect the confidentiality and integrity of transmitted information by isolating vMotion traffic. | The security issue with vMotion migrations is that information is transmitted in plain text, and anyone with access to the network over which this information flows can view it. Potential... |
V-63267 | Medium | The system must protect the confidentiality and integrity of transmitted information by protecting ESXi management traffic. | The vSphere management network provides access to the vSphere management interface on each component. Services running on the management interface provide an opportunity for an attacker to gain... |
V-63465 | Medium | The system must enable lockdown mode to restrict remote access. | Enabling lockdown mode disables direct access to an ESXi host requiring the host be managed remotely from vCenter Server. This is done to ensure the roles and access controls implemented in... |
V-63299 | Medium | All port groups must not be configured to VLAN values reserved by upstream physical switches. | Certain physical switches reserve certain VLAN IDs for internal purposes and often disallow traffic configured to these values. For example, Cisco Catalyst switches typically reserve VLANs... |
V-63779 | Medium | The VMM must synchronize internal information system clocks to the authoritative time source when the time difference is greater than one second. | To assure the accuracy of the system clock, it must be synchronized with an authoritative time source within DoD. Many system functions, including time-based login and activity restrictions,... |
V-63477 | Medium | The VMM must support the capability to centrally review and analyze audit records from multiple components within the system by configuring remote logging. | Remote logging to a central log host provides a secure, centralized store for ESXi logs. By gathering host log files onto a central host it can more easily monitor all hosts with a single tool. It... |
V-63291 | Medium | The virtual switch Promiscuous Mode policy must be set to reject. | When promiscuous mode is enabled for a virtual switch all virtual machines connected to the Portgroup have the potential of reading all packets across that network, meaning only the virtual... |
V-63773 | Medium | The VMM must automatically terminate a user session after inactivity timeouts have expired or at shutdown by setting an idle timeout. | If a user forgets to log out of their SSH session, the idle connection will remains open indefinitely, increasing the potential for someone to gain privileged access to the host. The... |
V-63777 | Medium | The VMM must automatically terminate a user session after inactivity timeouts have expired or at shutdown. | When the Direct console user interface (DCUI) is enabled and logged in it should be automatically logged out if left logged in to avoid unauthorized privilege gains. The DcuiTimeOut defines a... |
V-63775 | Medium | The VMM must automatically terminate a user session after inactivity timeouts have expired or at shutdown by setting an idle timeout on shell services. | When the ESXi Shell or SSH services are enabled on a host they will run indefinitely. To avoid having these services left running set the ESXiShellTimeOut. The ESXiShellTimeOut defines a window... |
V-63309 | Medium | The system must not provide root/administrator level access to CIM-based hardware monitoring tools or other third-party applications. | The CIM system provides an interface that enables hardware-level management from remote applications via a set of standard APIs. Create a limited-privilege, read-only service account for CIM.... |
V-63301 | Medium | The non-negotiate option must be configured for trunk links between external physical switches and virtual switches in VST mode. | In order to communicate with virtual switches in VST mode, external switch ports must be configured as trunk ports. VST mode does not support Dynamic Trunking Protocol (DTP), so the trunk must be... |
V-73129 | Medium | The system must protect the confidentiality and integrity of transmitted information by isolating IP-based storage traffic. | Virtual machines might share virtual switches and VLANs with the IP-based storage configurations. IP-based storage includes VSAN, iSCSI, and NFS. This configuration might expose IP-based storage... |
V-63305 | Medium | Virtual switch VLANs must be fully documented and have only the required VLANs. | When defining a physical switch port for trunk mode, only specified VLANs must be configured on the VLAN trunk link. The risk with not fully documenting all VLANs on the vSwitch is that it is... |
V-63915 | Medium | The VMM must off-load audit records onto a different system or media than the system being audited by configuring remote logging. | Remote logging to a central log host provides a secure, centralized store for ESXi logs. By gathering host log files onto a central host it can more easily monitor all hosts with a single tool. It... |
V-63283 | Medium | The system must configure the firewall to block network traffic by default. | In addition to service specific firewall rules ESXi has a default firewall rule policy to allow or deny incoming and outgoing traffic. Reduce the risk of attack by making sure this is set to deny... |
V-63919 | Medium | The VMM must enforce a minimum 15-character password length. | To enforce the use of complex passwords, minimum numbers of characters of different classes are mandated. The use of complex passwords reduces the ability of attackers to successfully obtain valid... |
V-63287 | Medium | The virtual switch Forged Transmits policy must be set to reject. | If the virtual machine operating system changes the MAC address, the operating system can send frames with an impersonated source MAC address at any time. This allows an operating system to stage... |
V-63275 | Medium | SNMP must be configured properly. | If SNMP is not being used, it must remain disabled. If it is being used, the proper trap destination must be configured. If SNMP is not properly configured, monitoring information can be sent to a... |
V-63757 | Medium | The VMM must require individuals to be authenticated with an individual authenticator prior to using a group authenticator by using the vSphere Authentication Proxy. | If you configure your host to join an Active Directory domain using Host Profiles the Active Directory credentials are saved in the host profile and are transmitted over the network. To avoid... |
V-63281 | Medium | The system must configure the firewall to restrict access to services running on the host. | Unrestricted access to services running on an ESXi host can expose a host to outside attacks and unauthorized access. Reduce the risk by configuring the ESXi firewall to only allow access from... |
V-63903 | Medium | The VMM must protect audit information from unauthorized deletion by configuring remote logging. | Remote logging to a central log host provides a secure, centralized store for ESXi logs. By gathering host log files onto a central host it can more easily monitor all hosts with a single tool. It... |
V-63905 | Medium | The VMM must require the change of at least 8 of the total number of characters when passwords are changed. | To enforce the use of complex passwords, minimum numbers of characters of different classes are mandated. The use of complex passwords reduces the ability of attackers to successfully obtain valid... |
V-63909 | Medium | The VMM must implement replay-resistant authentication mechanisms for network access to non-privileged accounts by using the vSphere Authentication Proxy. | If you configure your host to join an Active Directory domain using Host Profiles the Active Directory credentials are saved in the host profile and are transmitted over the network. To avoid... |
V-63293 | Medium | The system must prevent unintended use of the dvFilter network APIs. | If you are not using products that make use of the dvfilter network API, the host should not be configured to send network information to a VM. If the API is enabled an attacker might attempt to... |
V-63295 | Medium | All port groups must be configured to a value other than that of the native VLAN. | ESXi does not use the concept of native VLAN. Frames with VLAN specified in the port group will have a tag, but frames with VLAN not specified in the port group are not tagged and therefore will... |
V-63297 | Medium | All port groups must not be configured to VLAN 4095 unless Virtual Guest Tagging (VGT) is required. | When a port group is set to VLAN 4095, this activates VGT mode. In this mode, the vSwitch passes all network frames to the guest VM without modifying the VLAN tags, leaving it up to the guest to... |
V-63193 | Medium | The SSH daemon must ignore .rhosts files. | SSH trust relationships mean a compromise on one host can allow an attacker to move trivially to other hosts. |
V-63195 | Medium | The SSH daemon must not allow host-based authentication. | SSH trust relationships mean a compromise on one host can allow an attacker to move trivially to other hosts. |
V-63203 | Medium | The SSH daemon must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms. | DoD information systems are required to use FIPS 140-2 approved cryptographic hash functions.
Note: This does not imply FIPS 140-2 certification. |
V-63201 | Medium | The SSH daemon must not permit user environment settings. | SSH environment options potentially allow users to bypass access restriction in some configurations. |
V-63209 | Medium | The SSH daemon must perform strict mode checking of home directory configuration files. | If other users have access to modify user-specific SSH configuration files, they may be able to log into the system as another user. |
V-63501 | Medium | The SSH daemon must be configured to only use FIPS 140-2 approved ciphers. | Approved algorithms should impart some level of confidence in their implementation. These are also required for compliance.
Note: That this does not imply FIPS 140-2 certification. |
V-63181 | Medium | The system must enforce the unlock timeout of 15 minutes after a user account is locked out. | By limiting the number of failed login attempts, the risk of unauthorized access via user password guessing, otherwise known as brute-forcing, is reduced. Limits are imposed by locking the account. |
V-63183 | Medium | The system must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system. | Failure to display the DoD logon banner prior to a log in attempt will negate legal proceedings resulting from unauthorized access to system resources. |
V-63185 | Medium | The SSH daemon must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system. | Failure to display the DoD logon banner prior to a log in attempt will negate legal proceedings resulting from unauthorized access to system resources. |
V-63187 | Medium | The SSH daemon must be configured with the Department of Defense (DoD) login banner. | The warning message reinforces policy awareness during the logon process and facilitates possible legal action against attackers. Alternatively, systems whose ownership should not be obvious... |
V-63189 | Medium | The VMM must use DoD-approved encryption to protect the confidentiality of remote access sessions. | Approved algorithms should impart some level of confidence in their implementation. These are also required for compliance.
Note: This does not imply FIPS 140-2 certification. |
V-63833 | Medium | The VMM must protect audit information from unauthorized modification by configuring remote logging. | Remote logging to a central log host provides a secure, centralized store for ESXi logs. By gathering host log files onto a central host it can more easily monitor all hosts with a single tool. It... |
V-63211 | Medium | The SSH daemon must not allow compression or must only allow compression after successful authentication. | If compression is allowed in an SSH connection prior to authentication, vulnerabilities in the compression software could result in compromise of the system from an unauthenticated connection,... |
V-63215 | Medium | The SSH daemon must be configured to not allow X11 forwarding. | X11 forwarding over SSH allows for the secure remote execution of X11-based applications. This feature can increase the attack surface of an SSH connection. |
V-63217 | Medium | The SSH daemon must not accept environment variables from the client. | Environment variables can be used to change the behavior of remote sessions and should be limited. Locate environment variables that specify the language, character set, and other features... |
V-63219 | Medium | The SSH daemon must not permit tunnels. | OpenSSH has the ability to create network tunnels (layer-2 and layer-3) over an SSH connection. This function can provide similar convenience to a Virtual Private Network (VPN) with the similar... |
V-63531 | Medium | The VMM must enforce password complexity by requiring that at least one lower-case character be used. | To enforce the use of complex passwords, minimum numbers of characters of different classes are mandated. The use of complex passwords reduces the ability of attackers to successfully obtain valid... |
V-63923 | Medium | The VMM must enforce password complexity by requiring that at least one special character be used. | To enforce the use of complex passwords, minimum numbers of characters of different classes are mandated. The use of complex passwords reduces the ability of attackers to successfully obtain valid... |
V-63921 | Medium | The VMM must, at a minimum, off-load interconnected systems in real time and off-load standalone systems weekly by configuring remote logging. | Remote logging to a central log host provides a secure, centralized store for ESXi logs. By gathering host log files onto a central host it can more easily monitor all hosts with a single tool. It... |
V-63261 | Medium | The system must configure NTP time synchronization. | To assure the accuracy of the system clock, it must be synchronized with an authoritative time source within DoD. Many system functions, including time-based login and activity restrictions,... |
V-63885 | Medium | The VMM must provide the capability to immediately disconnect or disable remote access to the information system by disabling SSH. | The ESXi Shell is an interactive command line interface (CLI) available at the ESXi server console. The ESXi shell provides temporary access to commands essential for server maintenance. Intended... |
V-63225 | Medium | The SSH daemon must limit connections to a single session. | The SSH protocol has the ability to provide multiple sessions over a single connection without reauthentication. A compromised client could use this feature to establish additional sessions to a... |
V-63227 | Medium | The system must remove keys from the SSH authorized_keys file. | ESXi hosts come with SSH which can be enabled to allow remote access without requiring user authentication. To enable password free access copy the remote users public key into the... |
V-63245 | Medium | The system must use the vSphere Authentication Proxy to protect passwords when adding ESXi hosts to Active Directory. | If you configure your host to join an Active Directory domain using Host Profiles the Active Directory credentials are saved in the host profile and are transmitted over the network. To avoid... |
V-63241 | Medium | The system must disable ESXi Shell unless needed for diagnostics or troubleshooting. | The ESXi Shell is an interactive command line environment available locally from the DCUI or remotely via SSH. Activities performed from the ESXi Shell bypass vCenter RBAC and audit controls. The... |
V-63233 | Medium | The system must prohibit the reuse of passwords within five iterations. | If a user, or root, used the same password continuously or was allowed to change it back shortly after being forced to change it to something else, it would provide a potential intruder with the... |
V-63231 | Medium | The VMM must enforce password complexity by requiring that at least one upper-case character be used. | To enforce the use of complex passwords, minimum numbers of characters of different classes are mandated. The use of complex passwords reduces the ability of attackers to successfully obtain valid... |
V-63237 | Medium | The system must disable the Managed Object Browser (MOB). | The Managed Object Browser (MOB) provides a way to explore the object model used by the VMkernel to manage the host and enables configurations to be changed as well. This interface is meant to be... |
V-63239 | Medium | The VMM must be configured to disable non-essential capabilities by disabling SSH. | The ESXi Shell is an interactive command line interface (CLI) available at the ESXi server console. The ESXi shell provides temporary access to commands essential for server maintenance. Intended... |
V-63895 | Medium | The VMM must implement replay-resistant authentication mechanisms for network access to privileged accounts by using the vSphere Authentication Proxy. | If you configure your host to join an Active Directory domain using Host Profiles the Active Directory credentials are saved in the host profile and are transmitted over the network. To avoid... |
V-63235 | Medium | The password hashes stored on the system must have been generated using a FIPS 140-2 approved cryptographic hashing algorithm. | Systems must employ cryptographic hashes for passwords using the SHA-2 family of algorithms or FIPS 140-2 approved successors. The use of unapproved algorithms may result in weak password hashes... |
V-63257 | Low | The system must enable kernel core dumps. | In the event of a system failure, the system must preserve any information necessary to determine cause of failure and any information necessary to return to operations with least disruption to... |
V-63229 | Low | The system must produce audit records containing information to establish what type of events occurred. | Without establishing what types of events occurred, it would be difficult to establish, correlate, and investigate the events leading up to an outage or attack. |
V-63173 | Low | The system must verify the DCUI.Access list. | Lockdown mode disables direct host access requiring that admins manage hosts from vCenter Server. However, if a host becomes isolated from vCenter Server, the admin is locked out and can no... |
V-63175 | Low | The system must verify the exception users list for lockdown mode. | In vSphere 6.0 and later, you can add users to the Exception Users list from the vSphere Web Client. These users do not lose their permissions when the host enters lockdown mode. Usually you may... |
V-63771 | Low | The VMM must accept Personal Identity Verification (PIV) credentials. | To assure accountability and prevent unauthenticated access, privileged users must utilize multifactor authentication to prevent potential misuse and compromise of the system. |
V-63303 | Low | All physical switch ports must be configured with spanning tree disabled. | Since VMware virtual switches do not support STP, the ESXi host-connected physical switch ports must have portfast configured if spanning tree is enabled to avoid loops within the physical switch... |
V-63913 | Low | The VMM must only allow the use of DoD PKI-established certificate authorities for verification of the establishment of protected sessions. | To assure accountability and prevent unauthenticated access, privileged users must utilize multifactor authentication to prevent potential misuse and compromise of the system. |
V-63769 | Low | The VMM must require individuals to be authenticated with an individual authenticator prior to using a group authenticator by restricting use of Active Directory ESX Admin group membership. | When adding ESXi hosts to Active Directory, if the group "ESX Admins" exists, all user/group accounts assigned to the group will have full administrative access to the host. Discretion should be... |
V-63285 | Low | The system must enable BPDU filter on the host to prevent being locked out of physical switch ports with Portfast and BPDU Guard enabled. | BPDU Guard and Portfast are commonly enabled on the physical switch to which the ESXi host is directly connected to reduce the STP convergence delay. If a BPDU packet is sent from a virtual... |
V-63911 | Low | The VMM must implement replay-resistant authentication mechanisms for network access to non-privileged accounts by restricting use of Active Directory ESX Admin group membership. | When adding ESXi hosts to Active Directory, if the group "ESX Admins" exists, all user/group accounts assigned to the group will have full administrative access to the host. Discretion should be... |
V-63277 | Low | The system must enable bidirectional CHAP authentication for iSCSI traffic. | When enabled, vSphere performs bidirectional authentication of both the iSCSI target and host. There is a potential for a MiTM attack, when not authenticating both the iSCSI target and host, in... |
V-63273 | Low | The system must protect the confidentiality and integrity of transmitted information by utilizing different TCP/IP stacks where possible. | There are three different TCP/IP stacks by default available on ESXi now which are Default, Provisioning, and vMotion. To better protect and isolate sensitive network traffic within ESXi admins... |
V-63271 | Low | The system must protect the confidentiality and integrity of transmitted information. | There are now six types of management VMkernels that can be created for different types of traffic. In order to protect these types of management traffic admins must logically separate these onto... |
V-63605 | Low | The VMM must require individuals to be authenticated with an individual authenticator prior to using a group authenticator by using Active Directory for local user authentication. | Join ESXi hosts to an Active Directory (AD) domain to eliminate the need to create and maintain multiple local user accounts. Using AD for user authentication simplifies the ESXi host... |
V-63279 | Low | The system must disable Inter-VM transparent page sharing. | Published academic papers have demonstrated that by forcing a flush and reload of cache memory, it is possible to measure memory timings to try and determine an AES encryption key in use on... |
V-63907 | Low | The VMM must implement replay-resistant authentication mechanisms for network access to non-privileged accounts by using Active Directory for local user authentication. | Join ESXi hosts to an Active Directory (AD) domain to eliminate the need to create and maintain multiple local user accounts. Using AD for user authentication simplifies the ESXi host... |
V-63197 | Low | The SSH daemon must not permit root logins. | Permitting direct root login reduces auditable information about who ran privileged commands on the system and also allows direct attack attempts on root's password. |
V-63207 | Low | The SSH daemon must not permit Kerberos authentication. | Kerberos authentication for SSH is often implemented using GSSAPI. If Kerberos is enabled through SSH, the SSH daemon provides a means of access to the system's Kerberos implementation. ... |
V-63205 | Low | The SSH daemon must not permit GSSAPI authentication. | GSSAPI authentication is used to provide additional authentication mechanisms to applications. Allowing GSSAPI authentication through SSH exposes the system’s GSSAPI to remote hosts, increasing... |
V-63509 | Low | The VMM must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited. | Without establishing what types of events occurred, it would be difficult to establish, correlate, and investigate the events leading up to an outage or attack. |
V-63213 | Low | The SSH daemon must be configured to not allow gateway ports. | SSH TCP connection forwarding provides a mechanism to establish TCP connections proxied by the SSH server. This function can provide similar convenience to a Virtual Private Network (VPN) with the... |
V-73135 | Low | The system must configure the VSAN Datastore name to a unique name. | VSAN Datastore name by default is "vsanDatastore". If more than one VSAN cluster is present in vCenter both datastores will have the same name by default potentially leading to confusion and... |
V-63221 | Low | The SSH daemon must set a timeout count on idle sessions. | This ensures a user login will be terminated as soon as the "ClientAliveCountMax" is reached. |
V-63223 | Low | The SSH daemon must set a timeout interval on idle sessions. | Causing idle users to be automatically logged out guards against compromises one system leading trivially to compromises on another. |
V-73131 | Low | The system must enable the VSAN Health Check. | VSAN Health Check is enabled by default in vSphere 6.0 update 1 and later, it has to be manually installed and enabled on vSphere 6.0.0 prior to usage. The VSAN Health check is used for additional... |
V-63249 | Low | The system must use multifactor authentication for local access to privileged accounts. | To assure accountability and prevent unauthenticated access, privileged users must utilize multifactor authentication to prevent potential misuse and compromise of the system. |
V-63247 | Low | Active Directory ESX Admin group membership must not be used. | When adding ESXi hosts to Active Directory, if the group "ESX Admins" exists, all user/group accounts assigned to the group will have full administrative access to the host. Discretion should be... |
V-73133 | Low | The connectivity between VSAN Health Check and public Hardware Compatibility List must be disabled or restricted by use of an external proxy server. | The VSAN Health Check is able to download the hardware compatibility list from VMware in order to check compliance against the underlying VSAN Cluster hosts. To ensure the vCenter server is not... |
V-63243 | Low | The system must use Active Directory for local user authentication. | Join ESXi hosts to an Active Directory (AD) domain to eliminate the need to create and maintain multiple local user accounts. Using AD for user authentication simplifies the ESXi host... |
V-63899 | Low | The VMM must electronically verify Personal Identity Verification (PIV) credentials. | To assure accountability and prevent unauthenticated access, privileged users must utilize multifactor authentication to prevent potential misuse and compromise of the system. |
V-63897 | Low | The VMM must implement replay-resistant authentication mechanisms for network access to privileged accounts by restricting use of Active Directory ESX Admin group membership. | When adding ESXi hosts to Active Directory, if the group "ESX Admins" exists, all user/group accounts assigned to the group will have full administrative access to the host. Discretion should be... |
V-63893 | Low | The VMM must implement replay-resistant authentication mechanisms for network access to privileged accounts by using Active Directory for local user authentication. | Join ESXi hosts to an Active Directory (AD) domain to eliminate the need to create and maintain multiple local user accounts. Using AD for user authentication simplifies the ESXi host... |