# # This script is Copyright (C) 2004-2021 and is owned by Tenable, Inc. or an Affiliate thereof. # # This script is released under the Tenable Subscription License and # may not be used from within scripts released under another license # without authorization from Tenable, Inc. # # See the following licenses for details: # # http://static.tenable.com/prod_docs/Nessus_6_SLA_and_Subscription_Agreement.pdf # # @PROFESSIONALFEED@ # $Revision: 1.0 $ # $Date: 2021/12/03 $ # # Description : This document implements the security configuration as recommended by the # CIS VMware ESXi 7.0 Benchmark v1.1.0 # # #CIS VMware ESXi 7.0 v1.1.0 Level 1 # # CIS # CIS VMware ESXi 7.0 Level 1 # 1.1.0 # https://workbench.cisecurity.org/files/3473 # #vmware,cis,esxi,esxi_7,esxi_7.0 #LEVEL,CSCv7,CSCv8,CIS_Recommendation # # # NTP_SERVER # 0\.us\.pool\.ntp\.org # NTP server address # The name or IP address of the NTP server for your organization. # # # LOG_HOST # 192.168.0.1 # Remote syslog IP # The IP address of the centralized syslog server for your organization. # # # DCUI_ACCESS # root # DCUI Access Users # List of trusted users that can override lockdown mode # # # LOG_DIR # \\[\\] \/scratch\/log1 # System log dir # The path to the system log directory. # # # PASSWORD_POLICY # retry-3 min=disabled,disabled,disabled,disabled,14 # Password Quality Control # Value of the Security.PasswordQualityControl parameter # # # AUDIT_EXCEPTION_USERS # root # Lockdown mode xception users # List of users who are exceptions to lockdown mode rules # # # description : "1.1 Ensure ESXi is properly patched" info : "VMware Lifecycle Manager is a tool which may be utilized to automate patch management for vSphere hosts and virtual machines. Creating a baseline for patches is a good way to ensure all hosts are at the same patch level. VMware also publishes advisories on security patches and offers a way to subscribe to email alerts for them. Rationale: By staying up to date on ESXi patches, vulnerabilities in the hypervisor can be mitigated. An educated attacker can exploit known vulnerabilities when attempting to attain access or elevate privileges on an ESXi host. Impact: ESXi servers must be in Maintenance Mode to apply patches. This implies all VMs must be moved or powered off on the ESXi server, so the patching process may necessitate having brief outages. NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance." solution : "Employ a process to keep ESXi hosts up to date with patches in accordance with industry standards and internal guidelines. Leverage the VMware Lifecycle Manager to test and apply patches as they become available." reference : "800-53|SI-2,CSCv7|3.4,CSCv8|7.3,LEVEL|1M,CIS_Recommendation|1.1" see_also : "https://workbench.cisecurity.org/files/3473" type : AUDIT_ESX description : "2.1 Ensure NTP time synchronization is configured properly" info : "Network Time Protocol (NTP) synchronization should be configured correctly and enabled on each VMware ESXi host to ensure accurate time for system event logs. The time sources used by the ESXi hosts should be in sync with an agreed-upon time standard such as Coordinated Universal Time (UTC). There should be at minimum two NTP sources in place, and they should sync whenever possible. Rationale: By ensuring that all systems use the same relative time source (including the relevant localization offset), and that the relative time source can be correlated to an agreed-upon time standard, it is simpler to track and correlate an intruder's actions when reviewing the relevant log files. Incorrect time settings can also make auditing inaccurate." solution : "To enable and properly configure NTP synchronization, perform the following from the vSphere web client: Select a host Click Configure then expand System then select Time Configuration. Select Edit next to Network Time Protocol Select the Enable box, then fill in the appropriate NTP Servers. in the NTP Service Startup Policy drop down select Start and stop with host. Click OK. To implement the recommended configuration state, run the following PowerCLI command: # Set the NTP Settings for all hosts # If an internal NTP server is used, replace pool.ntp.org with # the IP address or the Fully Qualified Domain Name (FQDN) of the internal NTP server $NTPServers = 'pool.ntp.org', 'pool2.ntp.org' Get-VMHost | Add-VmHostNtpServer $NTPServers" reference : "800-171|3.3.7,800-53|AU-8(1),CIS_Recommendation|2.1,CN-L3|8.1.4.3(b),CSCv6|6.1,CSCv7|6.1,CSCv8|8.4,CSF|PR.PT-1,ISO/IEC-27001|A.12.4.4,ITSG-33|AU-8(1),LEVEL|1A,NESA|T3.6.7,NIAv2|NS44,NIAv2|NS45,NIAv2|NS46,NIAv2|NS47,PCI-DSSv3.1|10.4,PCI-DSSv3.2|10.4,QCSC-v1|8.2.1,QCSC-v1|13.2,TBA-FIISB|37.4" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - NTP Server : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - NTP Server : NOT found" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "NTP Server : " # Note: Variable @NTP_SERVER@ replaced with "0\\.us\\.pool\\.ntp\\.org" in field "expect". expect : "NTP Server : 0\\.us\\.pool\\.ntp\\.org$" type : AUDIT_ESX description : "2.2 Ensure the ESXi host firewall is configured to restrict access to services running on the host" info : "The ESXi firewall is enabled by default and allows ping (ICMP) and communication with DHCP/DNS clients. Access to services should only be allowed by authorized IP addresses/networks. Rationale: Unrestricted access to services running on an ESXi host can expose a host to outside attacks and unauthorized access. Reduce the risk by configuring the ESXi firewall to only allow access from authorized IP addresses and networks. Impact: Connections from IP addresses and ranges that are not explicitly set will be denied. Take care to ensure appropriate IPs/IP address ranges are allowed." solution : "To properly restrict access to services running on an ESXi host, perform the following from the vSphere web client: Select a host Click Configure then expand System then select Firewall. Click Edit to view services which are enabled (indicated by a check). For each enabled service, (e.g., ssh, vSphere Web Access, http client) provide a list of allowed IP addresses. Click OK." reference : "800-171|3.4.2,800-53|CM-6b.,CIS_Recommendation|2.2,CN-L3|8.1.10.6(d),CSCv7|9.4,CSCv8|4.4,CSF|PR.IP-1,ITSG-33|CM-6b.,LEVEL|1A,NESA|T3.2.1,SWIFT-CSCv1|2.3" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : " " xsl_stmt : " " xsl_stmt : " " xsl_stmt : " " xsl_stmt : " - All IP Allowed : " xsl_stmt : " " xsl_stmt : " " xsl_stmt : " " xsl_stmt : " " xsl_stmt : "" regex : "All IP Allowed :" not_expect : "All IP Allowed : true" type : AUDIT_ESX description : "2.3 Ensure Managed Object Browser (MOB) is disabled" info : "The Managed Object Browser (MOB) is a web-based server application that lets you examine objects that exist on the server side, explore the object model used by the VM kernel to manage the host, and change configurations. It is installed and started automatically when vCenter is installed. Rationale: The MOB is meant to be used primarily for debugging the vSphere SDK. Because there are no access controls, the MOB could also be used as a method to obtain information about a host being targeted for unauthorized access. Impact: Some third-party tools may utilize the Managed Object Browser (MOB) meaning that disabling it will cause those tools to malfunction." solution : "To disabled MOB, perform the following from the vSphere Web Client: Select a host Click Configure then expand System then select Advanced System Settings. Click Edit then search for Config.HostAgent.plugins.solo.enableMob Set the value to false. Click OK. Note: You cannot disable the MOB while a host is in lockdown mode. Note 2: You must disable MOB from the vSphere interface not via the vim-cmd command." reference : "800-171|3.4.6,800-171|3.4.7,800-53|CM-7,CIS_Recommendation|2.3,CSCv7|9.4,CSCv8|3.3,CSF|PR.IP-1,CSF|PR.PT-3,ITSG-33|CM-7,LEVEL|1A,NIAv2|SS15a,SWIFT-CSCv1|2.3" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - Config.HostAgent.plugins.solo.enableMob : NOT configured" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "Config.HostAgent.plugins.solo.enableMob : " expect : "Config.HostAgent.plugins.solo.enableMob : false" type : AUDIT_VCENTER description : "Ensure proper SNMP configuration" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "snmp\.receiver\.([Xx]|[0-9]+)\.enabled : " expect : "snmp\.receiver\.([Xx]|[0-9]+)\.enabled : TRUE$" type : AUDIT_VCENTER description : "2.5 Ensure SNMP is configured properly - 'community name public does not exist'" info : "Simple Network Management Protocol (SNMP) can be used to help manage hosts. Many organizations have other means in place of managing hosts and do not need SNMP enabled. If SNMP is needed, it should be configured properly to reduce the risk of misuse or compromise. For example, ESXi supports SNMPv3, which provides stronger security than SNMPv1 or SNMPv2, including key authentication and encryption. It is also important to configure the destination for SNMP traps. Rationale: If SNMP is not properly configured, monitoring data containing sensitive information may be sent to a malicious host and used to help exploit said host." solution : "To correct the SNMP configuration, perform the following from the ESXi Shell or vCLI: If SNMP is not needed, disable it by running: esxcli system snmp set --enable false If SNMP is needed, refer to the vSphere Monitoring and Performance guide, chapter 8 for steps to configure it. Additionally, the following PowerCLI command may be used to implement the configuration: # Update the host SNMP Configuration (single host connection required) Get-VmHostSNMP | Set-VMHostSNMP -Enabled:$true -ReadOnlyCommunity '' Notes: SNMP must be configured on each ESXi host SNMP settings can be configured using Host Profiles" reference : "800-171|3.5.2,800-53|IA-5c.,CIS_Recommendation|2.5,CN-L3|7.1.2.7(d),CN-L3|8.1.4.1(a),CSCv7|9.2,CSCv8|12.3,CSF|PR.AC-1,ISO/IEC-27001|A.9.4.3,ITSG-33|IA-5c.,LEVEL|1M,NESA|T5.2.1,NESA|T5.2.3,NESA|T5.5.2,NESA|T5.5.3,QCSC-v1|5.2.2,QCSC-v1|13.2" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "snmp\.receiver\.[0-9]+\.community : " not_expect : "snmp\.receiver\.[0-9]+\.community : [Pp][Uu][Bb][Ll][Ii][Cc]" type : AUDIT_VCENTER description : "2.5 Ensure SNMP is configured properly - 'community name private does not exist'" info : "Simple Network Management Protocol (SNMP) can be used to help manage hosts. Many organizations have other means in place of managing hosts and do not need SNMP enabled. If SNMP is needed, it should be configured properly to reduce the risk of misuse or compromise. For example, ESXi supports SNMPv3, which provides stronger security than SNMPv1 or SNMPv2, including key authentication and encryption. It is also important to configure the destination for SNMP traps. Rationale: If SNMP is not properly configured, monitoring data containing sensitive information may be sent to a malicious host and used to help exploit said host." solution : "To correct the SNMP configuration, perform the following from the ESXi Shell or vCLI: If SNMP is not needed, disable it by running: esxcli system snmp set --enable false If SNMP is needed, refer to the vSphere Monitoring and Performance guide, chapter 8 for steps to configure it. Additionally, the following PowerCLI command may be used to implement the configuration: # Update the host SNMP Configuration (single host connection required) Get-VmHostSNMP | Set-VMHostSNMP -Enabled:$true -ReadOnlyCommunity '' Notes: SNMP must be configured on each ESXi host SNMP settings can be configured using Host Profiles" reference : "800-171|3.5.2,800-53|IA-5c.,CIS_Recommendation|2.5,CN-L3|7.1.2.7(d),CN-L3|8.1.4.1(a),CSCv7|9.2,CSCv8|12.3,CSF|PR.AC-1,ISO/IEC-27001|A.9.4.3,ITSG-33|IA-5c.,LEVEL|1M,NESA|T5.2.1,NESA|T5.2.3,NESA|T5.5.2,NESA|T5.5.3,QCSC-v1|5.2.2,QCSC-v1|13.2" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "snmp\.receiver\.[0-9]+\.community : " not_expect : "snmp\.receiver\.[0-9]+\.community : [Pp][Rr][Ii][Vv][Aa][Tt][Ee]" description : "2.5 Ensure SNMP is configured properly - 'community name public does not exist'" info : "Simple Network Management Protocol (SNMP) can be used to help manage hosts. Many organizations have other means in place of managing hosts and do not need SNMP enabled. If SNMP is needed, it should be configured properly to reduce the risk of misuse or compromise. For example, ESXi supports SNMPv3, which provides stronger security than SNMPv1 or SNMPv2, including key authentication and encryption. It is also important to configure the destination for SNMP traps. Rationale: If SNMP is not properly configured, monitoring data containing sensitive information may be sent to a malicious host and used to help exploit said host." solution : "To correct the SNMP configuration, perform the following from the ESXi Shell or vCLI: If SNMP is not needed, disable it by running: esxcli system snmp set --enable false If SNMP is needed, refer to the vSphere Monitoring and Performance guide, chapter 8 for steps to configure it. Additionally, the following PowerCLI command may be used to implement the configuration: # Update the host SNMP Configuration (single host connection required) Get-VmHostSNMP | Set-VMHostSNMP -Enabled:$true -ReadOnlyCommunity '' Notes: SNMP must be configured on each ESXi host SNMP settings can be configured using Host Profiles" reference : "800-171|3.5.2,800-53|IA-5c.,CIS_Recommendation|2.5,CN-L3|7.1.2.7(d),CN-L3|8.1.4.1(a),CSCv7|9.2,CSCv8|12.3,CSF|PR.AC-1,ISO/IEC-27001|A.9.4.3,ITSG-33|IA-5c.,LEVEL|1M,NESA|T5.2.1,NESA|T5.2.3,NESA|T5.5.2,NESA|T5.5.3,QCSC-v1|5.2.2,QCSC-v1|13.2" see_also : "https://workbench.cisecurity.org/files/3473" description : "2.5 Ensure SNMP is configured properly - 'community name private does not exist'" info : "Simple Network Management Protocol (SNMP) can be used to help manage hosts. Many organizations have other means in place of managing hosts and do not need SNMP enabled. If SNMP is needed, it should be configured properly to reduce the risk of misuse or compromise. For example, ESXi supports SNMPv3, which provides stronger security than SNMPv1 or SNMPv2, including key authentication and encryption. It is also important to configure the destination for SNMP traps. Rationale: If SNMP is not properly configured, monitoring data containing sensitive information may be sent to a malicious host and used to help exploit said host." solution : "To correct the SNMP configuration, perform the following from the ESXi Shell or vCLI: If SNMP is not needed, disable it by running: esxcli system snmp set --enable false If SNMP is needed, refer to the vSphere Monitoring and Performance guide, chapter 8 for steps to configure it. Additionally, the following PowerCLI command may be used to implement the configuration: # Update the host SNMP Configuration (single host connection required) Get-VmHostSNMP | Set-VMHostSNMP -Enabled:$true -ReadOnlyCommunity '' Notes: SNMP must be configured on each ESXi host SNMP settings can be configured using Host Profiles" reference : "800-171|3.5.2,800-53|IA-5c.,CIS_Recommendation|2.5,CN-L3|7.1.2.7(d),CN-L3|8.1.4.1(a),CSCv7|9.2,CSCv8|12.3,CSF|PR.AC-1,ISO/IEC-27001|A.9.4.3,ITSG-33|IA-5c.,LEVEL|1M,NESA|T5.2.1,NESA|T5.2.3,NESA|T5.5.2,NESA|T5.5.3,QCSC-v1|5.2.2,QCSC-v1|13.2" see_also : "https://workbench.cisecurity.org/files/3473" type : AUDIT_ESX description : "2.6 Ensure dvfilter API is not configured if not used" info : "The dvfilter network API is used by some products (e.g., VMSafe). If it is not in use, it should not be configured to send network information to a VM. Rationale: If the dvfilter network API is enabled in the future and it is already configured, an attacker might attempt to connect a VM to it, thereby potentially providing access to the network of other VMs on the host. Impact: This will prevent a dvfilter-based network security appliance such as a firewall from functioning if not configured correctly." solution : "To remove the configuration for the dvfilter network API, perform the following from the vSphere web client: From the vSphere web client, select the host and click Configure then expand System Click on Advanced System Settings then Edit. Search for Net.DVFilterBindIpAddress in the filter. Set Net.DVFilterBindIpAddress has an empty value. If an appliance is being used, make sure the value of this parameter is set to the proper IP address. Enter the proper IP address. Click OK. To implement the recommended configuration state, run the following PowerCLI command: # Set Net.DVFilterBindIpAddress to null on all hosts Get-VMHost HOST1 | Foreach { Set-AdvancedSetting -VMHost $_ -Name Net.DVFilterBindIpAddress -IPValue '' } Default Value: Not configured" reference : "800-171|3.1.1,800-53|AC-3,CIS_Recommendation|2.6,CN-L3|8.1.4.2(f),CN-L3|8.1.4.11(b),CN-L3|8.1.10.2(c),CN-L3|8.5.3.1,CN-L3|8.5.4.1(a),CSCv7|9.2,CSCv8|12.3,CSF|PR.AC-4,CSF|PR.PT-3,ISO/IEC-27001|A.9.4.1,ISO/IEC-27001|A.9.4.5,ITSG-33|AC-3,LEVEL|1A,NESA|T4.2.1,NESA|T5.4.4,NESA|T5.4.5,NESA|T5.5.4,NESA|T5.6.1,NESA|T7.5.2,NESA|T7.5.3,NIAv2|AM3,NIAv2|SS29,QCSC-v1|3.2,QCSC-v1|5.2.2,QCSC-v1|13.2,TBA-FIISB|31.1" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - Net.DVFilterBindIpAddress : NOT configured" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "Net\.DVFilterBindIpAddress : " expect : "Net\.DVFilterBindIpAddress : NOT configured" description : "2.8 Ensure vSphere Authentication Proxy is used when adding hosts to Active Directory" info : "vSphere Authentication Proxy enables ESXi hosts to join a domain without using Active Directory credentials. vSphere Authentication Proxy enhances security for PXE-booted hosts and hosts that are provisioned using Auto Deploy and Host profiles, by removing the need to store Active Directory credentials in the host configuration. The vSphere Authentication Proxy service binds to an IPv4 address for communication with vCenter Server, and does not support IPv6. The vCenter Server can be on a host machine in an IPv4-only, IPv4/IPv6 mixed-mode, or IPv6-only network environment, but the machine that connects to the vCenter Server through the vSphere Client must have an IPv4 address for the vSphere Authentication Proxy service to work. Rationale: If you configure your host to join an Active Directory domain using Host Profiles the Active Directory credentials are saved in the host profile and are transmitted over the network. To avoid having to save Active Directory credentials in the Host Profile and to avoid transmitting Active Directory credentials over the network use the vSphere Authentication Proxy. NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance." solution : "To properly set the vSphere Authentication Proxy from Web Client directly: Select the host Click on Configure then expand System, select Authentication Services. Click on Join Domain Select Using Proxy Server radio button. Provide proxy server IP address. To properly set the vSphere Authentication Proxy via Host Profiles: In the vSphere Web Client go to Home in the menu. Click on Policies and Profiles followed by Host Profiles. Choose the appropriate host profile Select Configure followed by Edit Host Profile... then expand Security and Services followed by Security Settings, then Authentication configuration. Select Active Directory configuration. Set the JoinDomain Method is configured to Use vSphere Authentication Proxy to add the host to the domain. Click on Save." reference : "800-53|IA-2,CSCv7|16.2,CSCv8|5.6,LEVEL|1A,CIS_Recommendation|2.8" see_also : "https://workbench.cisecurity.org/files/3473" type : AUDIT_ESX description : "3.2 Ensure persistent logging is configured for all ESXi hosts" info : "ESXi can be configured to store log files on an in-memory file system. This occurs when the host's Syslog.global.LogDir property is set to a non-persistent location, such as /scratch. When this is done, only a single day's worth of logs are stored at any time. Additionally, log files will be reinitialized upon each reboot. Rationale: Non-persistent logging presents a security risk because user activity logged on the host is only stored temporarily and will not be preserved across reboots. This can also complicate auditing and make it harder to monitor events and diagnose issues. ESXi host logging should always be configured to a persistent datastore." solution : "To configure persistent logging properly, perform the following from the vSphere web client: Select the host Click Configure then expand System then select Advanced System Settings. Select Edit then enter Syslog.global.LogDir in the filter. Set Syslog.global.logDir to a persistent location specified as [datastorename] path_to_file where the path is relative to the datastore. For example, [datastore1] /systemlogs. Click OK. Alternatively, run the following PowerCLI command: # Set Syslog.global.logDir for each host Get-VMHost | Foreach { Set-AdvancedConfiguration -VMHost $_ -Name Syslog.global.logDir -Value '' }" reference : "800-171|3.3.1,800-171|3.3.2,800-53|AU-12,CIS_Recommendation|3.2,CSCv7|6.2,CSCv7|6.3,CSCv8|8.2,CSCv8|8.5,CSF|DE.CM-1,CSF|DE.CM-3,CSF|DE.CM-7,CSF|PR.PT-1,ITSG-33|AU-12,LEVEL|1A,QCSC-v1|3.2,QCSC-v1|6.2,QCSC-v1|8.2.1,QCSC-v1|13.2,SWIFT-CSCv1|6.4" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - Syslog.global.logDir : NOT found" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "Syslog\.global\.logDir : " # Note: Variable @LOG_DIR@ replaced with "\\\\[\\\\] \\/scratch\\/log1" in field "expect". expect : "Syslog\.global\.logDir : \\\\[\\\\] \\/scratch\\/log1$" type : AUDIT_ESX description : "3.3 Ensure remote logging is configured for ESXi hosts" info : "By default, ESXI logs are stored on a local scratch volume or ramdisk. To preserve logs, also configure remote logging to a central log host for the ESXI hosts. Rationale: Remote logging to a central log host provides a secure, centralized store for ESXi logs. You can more easily monitor all hosts with a single tool. You can also do aggregate analysis and searching to look for such things as coordinated attacks on multiple hosts. Logging to a secure, centralized log server helps prevent log tampering and provides a long-term audit record." solution : "To configure remote logging properly, perform the following from the vSphere web client: Select the host Click Configure then expand System then select Advanced System Settings. Select Edit then enter Syslog.global.logHost in the filter. Set the Syslog.global.logHost to the hostname or IP address of the central log server. Click OK. Alternately, run the following PowerCLI command: # Set Syslog.global.logHost for each host Get-VMHost | Foreach { Set-AdvancedSetting -VMHost $_ -Name Syslog.global.logHost -Value '' } Note: When setting a remote log host, it is also recommended to set the 'Syslog.global.logDirUnique' to true. You must configure the syslog settings for each host." reference : "800-171|3.3.8,800-53|AU-9(2),CIS_Recommendation|3.3,CN-L3|8.1.3.5(d),CN-L3|8.1.4.3(c),CSCv7|6.2,CSCv7|6.3,CSCv7|6.5,CSCv8|8.2,CSCv8|8.5,CSCv8|8.9,CSF|PR.PT-1,ISO/IEC-27001|A.12.4.2,ITSG-33|AU-9(2),LEVEL|1A,NESA|M5.2.3,NESA|M5.5.2,NIAv2|SS13e,QCSC-v1|8.2.1,QCSC-v1|13.2" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - Syslog.global.logHost : NOT configured" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "Syslog\.global\.logHost : " # Note: Variable @LOG_HOST@ replaced with "192.168.0.1" in field "expect". expect : "Syslog\.global\.logHost : 192.168.0.1$" type : AUDIT_ESX description : "4.2 Ensure passwords are required to be complex" info : "ESXi uses the pam_passwdqc.so plug-in to set password strength and complexity. Options include setting minimum password length, requiring password characters to come from particular character sets, and restricting the number of consecutive failed logon attempts permitted. The settings should enforce the organization's password policies. Note that an uppercase character that begins a password does not count toward the number of character classes used, and neither does a number that ends a password. Rationale: All passwords for ESXi hosts should be hard to guess to reduce the risk of unauthorized access. Note: ESXi imposes no restrictions on the root password. Password strength and complexity rules only apply to non-root users." solution : "To set the password complexity requirements, perform the following: Login to the ESXi shell as a user with administrator privileges. Open /etc./pam.d/passwd. Locate the following line: password requisite /lib/security/$ISA/pam_passwdqc.so retry=N min=N0,N1,N2,N3,N4 Set N to less than or equal to 5. Set N0 to disabled. Set N1 to disabled. Set N2 to disabled. Set N3 to disabled. Set N4 to 14 or greater. The above requires all passwords to be 14 or more characters long and comprised of at least one character from four distinct character sets. Additionally, a maximum of 3 consecutive failed login attempts are permitted." reference : "800-171|3.5.2,800-53|IA-5(1),CIS_Recommendation|4.2,CSCv7|4.4,CSCv8|5.2,CSF|PR.AC-1,ITSG-33|IA-5(1),LEVEL|1M,NESA|T5.2.3,QCSC-v1|5.2.2,QCSC-v1|13.2,SWIFT-CSCv1|4.1" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - Security.PasswordQualityControl : NOT found" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "Security\.PasswordQualityControl : " # Note: Variable @PASSWORD_POLICY@ replaced with "retry-3 min=disabled,disabled,disabled,disabled,14" in field "expect". expect : "Security\.PasswordQualityControl : retry-3 min=disabled,disabled,disabled,disabled,14" type : AUDIT_ESX description : "4.3 Ensure the maximum failed login attempts is set to 3" info : "Authentication should be configured so there is a maximum number of consecutive failed login attempts for each account, at which point the account at risk will be locked out. Rationale: Multiple account login failures for the same account could possibly be an attacker trying to brute force guess the password. Impact: A users account will be locked after 3 unsuccessful login attempts." solution : "To set the maximum failed login attempts correctly, perform the following steps: From the vSphere Web Client, select the host. Click Configure then expand System. Select Advanced System Settings then click Edit. Enter Security.AccountLockFailures in the filter. Set the value for this parameter to 5. Alternately, use the following PowerCLI command: Get-VMHost | Get-AdvancedSetting -Name Security.AccountLockFailures | Set-AdvancedSetting -Value 3" reference : "800-171|3.1.8,800-53|AC-7a.,CIS_Recommendation|4.3,CN-L3|8.1.4.1(b),CSCv7|16.7,CSCv8|6.2,ITSG-33|AC-7a.,LEVEL|1A,NESA|T5.5.1,NIAv2|AM24,TBA-FIISB|45.1.2,TBA-FIISB|45.2.1,TBA-FIISB|45.2.2" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - Security.AccountLockFailures : NOT configured" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "Security\.AccountLockFailures : " expect : "Security\.AccountLockFailures : \b[1-3]\b" type : AUDIT_ESX description : "4.4 Ensure account lockout is set to 15 minutes" info : "An account is automatically locked after the maximum number of failed consecutive login attempts is reached. The account should be automatically unlocked after 15 minutes, otherwise administrators will need to manually unlock accounts on request by authorized users. Rationale: This setting reduces the inconvenience for benign users and the overhead on administrators, while also severely slowing down any brute force password guessing attacks." solution : "To set the account lockout to 15 minutes, perform the following: From the vSphere Web Client, select the host. Click Configure then expand System. Select Advanced System Settings then click Edit. Enter Security.AccountUnlockTime in the filter. Set the value for this parameter to 900. Alternately, use the following PowerCLI command: Get-VMHost | Get-AdvancedSetting -Name Security.AccountUnlockTime | Set-AdvancedSetting -Value 900" reference : "800-171|3.1.8,800-53|AC-7a.,CIS_Recommendation|4.4,CN-L3|8.1.4.1(b),CSCv7|16.11,CSCv8|4.3,ITSG-33|AC-7a.,LEVEL|1A,NESA|T5.5.1,NIAv2|AM24,TBA-FIISB|45.1.2,TBA-FIISB|45.2.1,TBA-FIISB|45.2.2" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - Security.AccountUnlockTime : NOT configured" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "Security.AccountUnlockTime : " expect : "Security.AccountUnlockTime : \b([0-9]|[1-8][0-9]|9[0-9]|[1-8][0-9]{2}|900)\b" type : AUDIT_ESX description : "4.5 Ensure previous 24 passwords are prohibited" info : "This setting prevents users from utilizing previously used passwords. Rationale: Users may attempt to reuse passwords which could lead to a compromised password being used. At least the past 24 passwords should be prevented from use for a user to ensure password re-use is not occurring. Impact: Users will be unable to use any of their past 24 passwords." solution : "To set the password history 24, perform the following: From the vSphere Web Client, select the host. Click Configure then expand System. Select Advanced System Settings then click Edit. Enter Security.PasswordHistory in the filter. Set the value for this parameter is set to 24. Alternately, the following PowerCLI command may be used: Get-VMHost | Get-AdvancedSetting Security.PasswordHistory | Set-AdvancedSetting -Value 24 Default Value: None" reference : "800-171|3.5.8,800-53|IA-5(1)(e),CIS_Recommendation|4.5,CSCv7|4.4,CSCv8|5.2,CSF|PR.AC-1,ISO/IEC-27001|A.9.4.3,ITSG-33|IA-5(1)(e),LEVEL|1M,NESA|T5.2.3,NIAv2|AM22c,QCSC-v1|5.2.2,QCSC-v1|13.2,SWIFT-CSCv1|4.1,TBA-FIISB|26.2.3" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - Security.PasswordHistory : NOT found" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "Security\.PasswordHistory : " expect : "Security\.PasswordHistory : (2[4-9]|[2-9][0-9]+)" description : "4.7 Ensure only authorized users and groups belong to the esxAdminsGroup group" info : "The AD group used by vSphere is defined by the esxAdminsGroup attribute. By default, this attribute is set to 'ESX Admins'. All members of the group are granted full administrative access to all ESXi hosts in the domain. Monitor AD for the creation of this group, and limit membership to highly trusted users and groups. Rationale: An unauthorized user or group having membership in the esxAdminsGroup group will have full administrative access to all ESXi hosts. Such users may compromise the confidentiality, availability, and integrity of the all ESXi hosts and the respective data and processes they influence. NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance." solution : "To remove unauthorized users and groups belonging to esxAdminsGroup, perform the following steps after coordination between vSphere admins and Active Directory admins: Verify the setting of the esxAdminsGroup attribute. View the list of members for that Microsoft Active Directory group. Remove all unauthorized users and groups from that group. If full admin access for the AD ESX admins group is not desired, you can disable this behavior using the advanced host setting: 'Config.HostAgent.plugins.hostsvc.esxAdminsGroupAutoAdd'. Default Value: 'ESX Admins'" reference : "800-53|AC-6,CSCv7|4.1,CSCv8|5.1,CSCv8|5.4,LEVEL|1M,CIS_Recommendation|4.7" see_also : "https://workbench.cisecurity.org/files/3473" type : AUDIT_ESX description : "4.8 Ensure the Exception Users list is properly configured" info : "Users who are added to the 'Exception Users' list do not lose their permissions when the host enters lockdown mode. Usually you may want to add some service accounts, such as a backup agent, to the Exception Users list. Rationale: Users who do not require special permissions should not be exempted from lockdown mode because this increases the risk of unauthorized actions being performed, especially if a user account is compromised. Impact: If a user is not added to the exception list but should be when host is in lockdown mode they will be unable to perform operations." solution : "To correct the membership of the Exception Users list, perform the following in the vSphere Web Client: Select the host. Click on Configure then expand System and select Security Profile. Select Edit next to Lockdown Mode. Click on Exception Users. Add or delete users as appropriate. Click OK." reference : "800-171|3.1.5,800-53|AC-6(5),CIS_Recommendation|4.8,CN-L3|8.1.10.6(a),CSCv7|14.6,CSCv7|16.6,CSCv8|3.3,CSCv8|5.1,CSF|PR.AC-4,ISO/IEC-27001|A.9.2.3,ITSG-33|AC-6(5),LEVEL|1M,NESA|T5.1.1,NESA|T5.2.2,NESA|T5.6.1,NIAv2|AM32,NIAv2|AM33,NIAv2|VL3a,QCSC-v1|5.2.2,QCSC-v1|6.2,SWIFT-CSCv1|1.2,TBA-FIISB|31.4.2,TBA-FIISB|31.4.3" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - DCUI.Access : NOT found" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "DCUI\.Access : " # Note: Variable @AUDIT_EXCEPTION_USERS@ replaced with "root" in field "expect". expect : "DCUI\.Access : root$" type : AUDIT_ESX description : "5.1 Ensure the DCUI timeout is set to 1800 seconds or less" info : "The Direct Console User Interface (DCUI) is used for directly logging into an ESXi host and carrying out host management tasks. This setting terminates an idle DCUI session after the specified number of seconds has elapsed. Rationale: Terminating idle DCUI sessions helps avoid unauthorized usage of the DCUI originating from leftover login sessions." solution : "To correct the DCUI timeout setting, perform the following steps: From the vSphere Web Client, select the host. Click Configure, then under System select Advanced System Settings. Select Edit then enter UserVars.DcuiTimeOut in the filter. Click in the box for the current value, then set the value to 1800 seconds or less. Alternately, use the following PowerCLI command: Get-VMHost | Get-AdvancedSetting -Name UserVars.DcuiTimeOut | Set-AdvancedSetting -Value 1800" reference : "800-171|3.1.11,800-53|AC-12,CIS_Recommendation|5.1,CN-L3|7.1.2.2(d),CN-L3|7.1.3.7(b),CN-L3|8.1.4.1(b),CSCv7|16.11,CSCv8|4.3,ITSG-33|AC-12,LEVEL|1A,NIAv2|NS49" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - UserVars.DcuiTimeOut : NOT configured" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "UserVars\.DcuiTimeOut : " expect : "UserVars\.DcuiTimeOut : \b(([1-9]$)|([1-9][0-9]$)|([1-9][0-9][0-9]$)|([1][0-7][0-9][0-9]$)|(1800$))\b" type : AUDIT_ESX description : "5.2 Ensure the ESXi shell is disabled" info : "The ESXi shell is an interactive command line environment available from the Direct Console User Interface (DCUI) or remotely via SSH. The ESXi shell should only be enabled on a host when running diagnostics or troubleshooting. Rationale: Activities performed from the ESXi shell bypass vCenter RBAC and audit controls, so the ESXi shell should only be enabled when needed to troubleshoot/resolve problems that cannot be fixed through the vSphere web client or vCLI/PowerCLI." solution : "To disable the ESXi shell, perform the following: From the vSphere Web Client, select the host. Select Configure then expand System and select Services. Click on ESXi Shell then click Edit Startup Policy. Set the Startup Policy is set to Start and Stop Manually. Click on OK. Alternately, use the following PowerCLI command: # Set the ESXi shell to start manually rather than automatically for all hosts Get-VMHost | Get-VMHostService | Where { $_.key -eq 'TSM' } | Set-VMHostService -Policy Off" reference : "800-171|3.4.6,800-171|3.4.7,800-53|CM-7,CIS_Recommendation|5.2,CSCv7|9.2,CSCv8|4.8,CSF|PR.IP-1,CSF|PR.PT-3,ITSG-33|CM-7,LEVEL|1A,NIAv2|SS15a,SWIFT-CSCv1|2.3" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - : running = " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - ESXi Shell : running = NOT configured" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "ESXi Shell : running =" expect : "ESXi Shell : running = FALSE$" type : AUDIT_ESX description : "5.3 Ensure SSH is disabled" info : "The ESXi shell, when enabled, can be accessed directly from the host console through the DCUI or remotely using SSH. Disable Secure Shell (SSH) for each ESXi host to prevent remote access to the ESXi shell, and only enable SSH when needed for troubleshooting or diagnostics. Rationale: Remote access to the host should be limited to the vSphere Client, remote command-line tools (vCLI/PowerCLI), and through the published APIs. Under normal circumstances, remote access to the host using SSH should be disabled. Impact: In troubleshooting and assessment scenarios having SSH disabled, which is the default, may prevent connections to the host by tools or via other methods." solution : "To disable SSH, perform the following: From the vSphere Web Client, select the host. Select Configure then expand System and select Services. Click on SSH then click Edit Startup Policy. Set the Startup Policy is set to Start and Stop Manually. Click OK. While ESXi Shell is still selected click Stop. Alternately, use the following PowerCLI command: # Set SSH to start manually rather than automatically for all hosts Get-VMHost | Get-VMHostService | Where { $_.key -eq 'TSM-SSH' } | Set-VMHostService -Policy Off" reference : "800-171|3.4.6,800-171|3.4.7,800-53|CM-7b.,CIS_Recommendation|5.3,CN-L3|7.1.3.5(c),CN-L3|7.1.3.7(d),CN-L3|8.1.4.4(b),CSCv7|9.2,CSCv8|4.8,CSF|PR.IP-1,CSF|PR.PT-3,ITSG-33|CM-7a.,LEVEL|1A,NIAv2|SS13b,NIAv2|SS14a,NIAv2|SS14c,QCSC-v1|3.2,SWIFT-CSCv1|2.3" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - : running = " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - SSH : running = NOT found" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "SSH : running = " expect : "SSH : running = FALSE$" description : "5.4 Ensure CIM access is limited" info : "The Common Information Model (CIM) system provides an interface that enables hardware-level management from remote applications using a set of standard APIs. Provide only the minimum access necessary to applications. Do not provision CIM-based hardware monitoring tools and other third-party applications to run as root or as another administrator account. Instead, create a dedicated service account specific to each CIM application with the minimal access and privileges needed for that application. Rationale: If CIM-based hardware monitoring tools or other third-party applications are granted unneeded administrator level access, they could potentially be used to compromise the security of the host. Impact: CIM-based hardware monitoring tools or other third-party applications that utilize CIM may not function as expected. NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance." solution : "To limit CIM access, perform the following: Create a limited-privileged service account for CIM and other third-party applications. This account should access the system via vCenter. Give the account the CIM Interaction privilege only. This will enable the account to obtain a CIM ticket, which can then be used to perform both read and write CIM operations on the target host. If an account must connect to the host directly, this account must be granted the full 'Administrator' role on the host. This is not recommended unless required by the monitoring software being used. Alternately, run the following PowerCLI command: # Create a new host user account -Host Local connection required- New-VMHostAccount -ID ServiceUser -Password -UserAccount" reference : "800-53|IA-4,CSCv7|4.3,CSCv8|4.8,LEVEL|1M,CIS_Recommendation|5.4" see_also : "https://workbench.cisecurity.org/files/3473" type : AUDIT_ESX description : "5.5 Ensure Normal Lockdown mode is enabled" info : "Enabling lockdown mode disables direct local access to an ESXi host, requiring the host be managed remotely from vCenter Server. There are some operations, such as backup and troubleshooting, that require direct access to the host. In these cases, lockdown mode can be disabled on a temporary basis for specific hosts as needed, and then re-enabled when the task is completed. Note: Lockdown mode does not apply to users who log in using authorized keys. Also, users in the DCUI.Access list for each host are allowed to override lockdown mode and log in to the DCUI. By default, the 'root' user is the only user listed in the DCUI.Access list. Rationale: Lockdown mode limits ESXi host access to the vCenter server to ensure the roles and access controls implemented in vCenter are always enforced and users cannot bypass them by logging into a host directly. By forcing all interaction to occur through vCenter Server, the risk of someone inadvertently attaining elevated privileges or performing tasks that are not properly audited is greatly reduced. Impact: With lockdown mode enabled the host will only be accessible through vCenter preventing 'local' access." solution : "To enable lockdown mode, perform the following from the vSphere web client: From the vSphere Web Client, select the host. Select Configure then expand System and select Security Profile. Across from Lockdown Mode click on Edit. Click the radio button for Normal. Click OK. Alternately, run the following PowerCLI command: # Enable lockdown mode for each host Get-VMHost | Foreach { $_.EnterLockdownMode() }" reference : "800-171|3.1.5,800-53|AC-6,CIS_Recommendation|5.5,CN-L3|7.1.3.2(b),CN-L3|7.1.3.2(g),CN-L3|8.1.4.2(d),CN-L3|8.1.10.6(a),CSCv7|16.2,CSCv8|5.6,CSF|PR.AC-4,CSF|PR.DS-5,ITSG-33|AC-6,LEVEL|1A,NESA|T5.1.1,NESA|T5.2.2,NESA|T5.4.1,NESA|T5.4.4,NESA|T5.4.5,NESA|T5.5.4,NESA|T5.6.1,NESA|T7.5.3,NIAv2|AM1,NIAv2|AM23f,NIAv2|SS13c,NIAv2|SS15c,QCSC-v1|5.2.2,QCSC-v1|6.2,QCSC-v1|13.2,SWIFT-CSCv1|5.1,TBA-FIISB|31.4.2,TBA-FIISB|31.4.3" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - Lockdown Mode : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - Lockdown Mode : NOT found" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "Lockdown Mode : " expect : "Lockdown Mode : (lockdownNormal|lockdownStrict)$" type : AUDIT_ESX description : "5.8 Ensure idle ESXi shell and SSH sessions time out after 1800 seconds or less" info : "The ESXiShellInteractiveTimeOut allows you to automatically terminate idle ESXi shell and SSH sessions. The permitted idle time should be 1800 seconds or less. Rationale: If a user forgets to log out of an ESXi shell or SSH session, the idle session will exist indefinitely, increasing the potential for someone to gain unauthorized privileged access to the host, unless a timeout is set." solution : "To set the timeout to the desired value, perform the following from the vSphere web client: From the vSphere Web Client, select the host. Click Configure then expand System. Select Advanced System Settings then click Edit. Enter ESXiShellInteractiveTimeOut in the filter. Set the value for this parameter is set to the appropriate value (1800 seconds or less). Click OK. Note: A value of 0 disables the ESXi ShellInteractiveTimeOut. Alternately, use the following PowerCLI command: # Set Remove UserVars.ESXiShellInteractiveTimeOut to 1800 on all hosts Get-VMHost | Get-AdvancedSetting -Name 'UserVars.ESXiShellInteractiveTimeOut' | Set-AdvancedSetting -Value '1800'" reference : "800-171|3.1.11,800-53|AC-12,CIS_Recommendation|5.8,CN-L3|7.1.2.2(d),CN-L3|7.1.3.7(b),CN-L3|8.1.4.1(b),CSCv7|16.11,CSCv8|4.3,ITSG-33|AC-12,LEVEL|1A,NIAv2|NS49" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - UserVars.ESXiShellInteractiveTimeOut : NOT configured" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "UserVars\.ESXiShellInteractiveTimeOut : " expect : "UserVars\.ESXiShellInteractiveTimeOut : \b(([1-9]$)|([1-9][0-9]$)|([1-9][0-9][0-9]$)|([1][0-7][0-9][0-9]$)|(1800$))\b" type : AUDIT_ESX description : "5.9 Ensure the shell services timeout is set to 30 minutes or less" info : "When the ESXi shell or SSH services are enabled on a host, they will run indefinitely. To avoid this, set the ESXiShellTimeOut, which defines a window of time after which the ESXi shell and SSH services will automatically be terminated. It is recommended to set the ESXiShellInteractiveTimeOut together with ESXiShellTimeOut. Rationale: This reduces the risk of an inactive ESXi shell or SSH service being misused by an unauthorized party to compromise a host." solution : "To set the timeout to the desired value, perform the following from the vSphere web client: From the vSphere Web Client, select the host. Click Configure then expand System. Select Advanced System Settings then click Edit. Enter ESXiShellTimeOut in the filter. Set the value for this parameter is set to 1800 or less Click OK. Note: A value of 0 disables the ESXiShellTimeOut. Alternately, run the following PowerCLI command: # Set UserVars.ESXiShellTimeOut to 1800 on all hosts Get-VMHost | Get-AdvancedSetting -Name 'UserVars.ESXiShellTimeOut' | Set-AdvancedSetting -Value '1800'" reference : "800-171|3.1.11,800-53|AC-12,CIS_Recommendation|5.9,CN-L3|7.1.2.2(d),CN-L3|7.1.3.7(b),CN-L3|8.1.4.1(b),CSCv7|16.11,CSCv8|4.3,ITSG-33|AC-12,LEVEL|1A,NIAv2|NS49" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - UserVars.ESXiShellTimeout : NOT configured" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "UserVars\.ESXiShellTimeout : " expect : "UserVars\.ESXiShellTimeout : (([1-9]$)|([1-9][0-9]$)|([1-9][0-9][0-9]$)|([1][0-7][0-9][0-9]$)|(1800$))" type : AUDIT_ESX description : "5.10 Ensure DCUI has a trusted users list for lockdown mode" info : "Lockdown mode disables direct host access, requiring admins to manage hosts from vCenter. Set DCUI.Access to a list of highly trusted users who would be able to override lockdown mode and access the DCUI in the event an ESXi host became isolated from vCenter. NOTE: If you disable lockdown mode using the DCUI, all users with the DCUI.Access privilege will be granted the Administrator role on the host. Rationale: The list prevents all admins from becoming locked out and no longer being able to manage the host." solution : "To set a trusted users list for DCUI, perform the following from the vSphere web client: From the vSphere Web Client, select the host. Click Configure then expand System. Select Advanced System Settings then click Edit. Enter DCUI.Access in the filter. Set the DCUI.Access attribute is set to a comma-separated list of the users who are allowed to override lockdown mode." reference : "800-171|3.1.2,800-171|3.1.15,800-53|AC-17(4),CIS_Recommendation|5.10,CN-L3|8.1.4.4(c),CN-L3|8.1.10.6(i),CSCv7|16.6,CSCv8|5.1,CSF|PR.AC-3,CSF|PR.PT-4,ISO/IEC-27001|A.6.2.2,ITSG-33|AC-17(4),LEVEL|1M,NESA|T5.4.5,QCSC-v1|3.2,QCSC-v1|5.2.1,QCSC-v1|5.2.2,SWIFT-CSCv1|5.1" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - DCUI.Access : NOT configured" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "DCUI\.Access : " # Note: Variable @DCUI_ACCESS@ replaced with "root" in field "expect". expect : "DCUI\.Access : root$" type : AUDIT_ESX description : "6.1 Ensure bidirectional CHAP authentication for iSCSI traffic is enabled" info : "vSphere allows for the use of bidirectional authentication of both the iSCSI target and host. Bidirectional Challenge-Handshake Authentication Protocol (CHAP), also known as Mutual CHAP, should be enabled to provide bidirectional authentication. Rationale: By not authenticating both the iSCSI target and host, there is a potential for a man-in-the-middle attack in which an attacker might impersonate either side of the connection to steal data. Bidirectional authentication can mitigate this risk. Note: Choosing not to enforce bidirectional authentication can make sense if you create a dedicated network or VLAN to service all your iSCSI devices. If the iSCSI facility is isolated from general network traffic, it is less vulnerable to exploitation." solution : "To enable bidirectional CHAP authentication for iSCSI traffic, perform the following: From the vSphere Web Client, select the host. Click Configure then expand Storage. Select Storage Adapters then select the iSCSI Adapter. Under Properties click on Edit next to Authentication. Next to Authentication Method select Use bidirectional CHAP from the dropdown. Specify the outgoing CHAP name. Make sure that the name you specify matches the name configured on the storage side. To set the CHAP name to the iSCSI adapter name, select 'Use initiator name'. To set the CHAP name to anything other than the iSCSI initiator name, deselect 'Use initiator name' and type a name in the Name text box. Enter an outgoing CHAP secret to be used as part of authentication. Use the same secret as your storage side secret. Specify incoming CHAP credentials. Make sure your outgoing and incoming secrets do not match. Click OK. Click the second to last symbol labeled Rescan Adapter. Alternately, run the following PowerCLI command: # Set the Chap settings for the Iscsi Adapter Get-VMHost | Get-VMHostHba | Where {$_.Type -eq 'Iscsi'} | Set-VMHostHba # Use desired parameters here" reference : "800-53|IA-3(1),CIS_Recommendation|6.1,CSCv7|16.5,CSCv8|3.10,CSF|PR.AC-1,ITSG-33|IA-3(1),LEVEL|1A,NESA|T5.4.3,QCSC-v1|13.2,TBA-FIISB|27.1" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - chapAuthEnabled : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - chapAuthEnabled : No iSCSI devices found " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "chapAuthEnabled : " not_expect : "chapAuthEnabled : FALSE$" description : "6.3 Ensure storage area network (SAN) resources are segregated properly" info : "Use zoning and logical unit number (LUN) masking to segregate storage area network (SAN) activity. Zoning provides access control in the SAN topology. Zoning defines which host bus adapters (HBAs) can connect to which targets. The devices outside a zone are not visible to the devices inside the zone when SAN zoning is configured. For example, zones defined for testing should be managed independently within the SAN so they do not interfere with activity in the production zones. Similarly, you can set up different zones for different departments. Zoning must take into account any host groups that have been set up on the SAN device. LUN masking is a process that makes a LUN available to some hosts and unavailable to other hosts. Rationale: Segregating SAN activity can reduce the attack surface for the SAN, prevent non-ESXi systems from accessing SANs, and separate environments, for example, test and production environments. NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance." solution : "The remediation procedures to properly segregate SAN activity are SAN vendor or product-specific. In general, with ESXi hosts, use a single-initiator zoning or a single-initiator-single-target zoning. The latter is a preferred zoning practice. Using the more restrictive zoning prevents problems and misconfigurations that can occur on the SAN." reference : "800-53|SC-7,CSCv7|14.1,CSCv7|14.2,CSCv8|3.12,LEVEL|1M,CIS_Recommendation|6.3" see_also : "https://workbench.cisecurity.org/files/3473" type : AUDIT_ESX description : "7.1 Ensure the vSwitch Forged Transmits policy is set to reject" info : "Set the vSwitch Forged Transmits policy to reject for each vSwitch. Reject Forged Transmit can be set at the vSwitch and/or the Portgroup level. You can override switch-level settings at the Portgroup level. Rationale: If the virtual machine operating system changes the MAC address, the operating system can send frames with an impersonated source MAC address at any time. This allows an operating system to stage malicious attacks on the devices in a network by impersonating a network adaptor authorized by the receiving network. Setting forged transmissions to accept means the virtual switch does not compare the source and effective MAC addresses. To protect against MAC address impersonation, all virtual switches should have forged transmissions set to reject. Impact: This will prevent VMs from changing their effective MAC address. This will affect applications that require this functionality, such as Microsoft Clustering, which requires systems to effectively share a MAC address. This will affect how a layer 2 bridge will operate. This will also affect applications that require a specific MAC address for licensing. An exception should be made for the port groups that these applications are connected to." solution : "To set the policy to reject forged transmissions, perform the following: From the vSphere Web Client, select the host. Click Configure then expand Networking. Select Virtual switches then click Edit. Click on Security. Set Forged transmits to Reject in the dropdown. Click on OK. Alternately, the following ESXi shell command may be used: # esxcli network vswitch standard policy security set -v vSwitch2 -f false" reference : "800-171|3.13.1,800-53|SC-7(12),CIS_Recommendation|7.1,CN-L3|8.1.10.6(j),CSCv7|12.4,CSCv8|4.4,CSF|DE.CM-1,CSF|PR.AC-5,CSF|PR.DS-5,CSF|PR.PT-4,ISO/IEC-27001|A.13.1.3,ITSG-33|SC-7(12),LEVEL|1A,NESA|T4.5.4,NIAv2|AM38,NIAv2|SS13d,NIAv2|SS26,QCSC-v1|5.2.1,QCSC-v1|5.2.2,QCSC-v1|6.2,QCSC-v1|8.2.1,TBA-FIISB|43.1" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - forgedTransmits = " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - forgedTransmits = NOT configured" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "forgedTransmits =" expect : "forgedTransmits = FALSE$" type : AUDIT_ESX description : "7.2 Ensure the vSwitch MAC Address Change policy is set to reject" info : "Ensure the MAC Address Change policy within the vSwitch is set to reject. Reject MAC Changes can be set at the vSwitch and/or the Portgroup level. You can override switch-level settings at the Portgroup level. Rationale: If the virtual machine operating system changes the MAC address, it can send frames with an impersonated source MAC address at any time. This allows it to stage malicious attacks on the devices in a network by impersonating a network adaptor authorized by the receiving network. Impact: This will prevent VMs from changing their effective MAC address. It will affect applications that require this functionality, such as Microsoft Clustering, which requires systems to effectively share a MAC address. This will affect how a layer 2 bridge will operate. This will also affect applications that require a specific MAC address for licensing. An exception should be made for the port groups that these applications are connected to." solution : "To set the policy to reject, perform the following: From the vSphere Web Client, select the host. Click Configure then expand Networking. Select Virtual switches then click Edit. Click on Security. Set MAC address changes to Reject in the dropdown. Click on OK. Alternately, perform the following using the ESXi shell: # esxcli network vswitch standard policy security set -v vSwitch2 -m false" reference : "800-171|3.13.1,800-53|SC-7(12),CIS_Recommendation|7.2,CN-L3|8.1.10.6(j),CSCv7|12.4,CSCv8|4.4,CSF|DE.CM-1,CSF|PR.AC-5,CSF|PR.DS-5,CSF|PR.PT-4,ISO/IEC-27001|A.13.1.3,ITSG-33|SC-7(12),LEVEL|1A,NESA|T4.5.4,NIAv2|AM38,NIAv2|SS13d,NIAv2|SS26,QCSC-v1|5.2.1,QCSC-v1|5.2.2,QCSC-v1|6.2,QCSC-v1|8.2.1,TBA-FIISB|43.1" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - macChanges = " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - macChanges = NOT configured" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "macChanges =" expect : "macChanges = FALSE$" type : AUDIT_ESX description : "7.3 Ensure the vSwitch Promiscuous Mode policy is set to reject" info : "Ensure the Promiscuous Mode Policy within the vSwitch is set to reject. Promiscuous mode can be set at the vSwitch and/or the Portgroup level. You can override switch-level settings at the Portgroup level. Rationale: When promiscuous mode is enabled for a virtual switch, all virtual machines connected to the dvPortgroup have the potential of reading all packets crossing that network. This could enable unauthorized access to the contents of those packets. Impact: There might be a legitimate reason to enable promiscuous mode for debugging, monitoring, or troubleshooting reasons. Security devices might require the ability to see all packets on a vSwitch. An exception should be made for the dvPortgroups that these applications are connected to in order to allow for full-time visibility to the traffic on that dvPortgroup." solution : "To set the policy to reject, perform the following: From the vSphere Web Client, select the host. Click Configure then expand Networking. Select Virtual switches then click Edit. Click on Security. Set Promiscuous mode to Reject in the dropdown. Click on OK. Alternately, perform the following via the ESXi shell: # esxcli network vswitch standard policy security set -v vSwitch2 -p false Default Value: Reject" reference : "800-171|3.13.1,800-53|SC-7(12),CIS_Recommendation|7.3,CN-L3|8.1.10.6(j),CSCv7|12.4,CSCv8|4.4,CSF|DE.CM-1,CSF|PR.AC-5,CSF|PR.DS-5,CSF|PR.PT-4,ISO/IEC-27001|A.13.1.3,ITSG-33|SC-7(12),LEVEL|1A,NESA|T4.5.4,NIAv2|AM38,NIAv2|SS13d,NIAv2|SS26,QCSC-v1|5.2.1,QCSC-v1|5.2.2,QCSC-v1|6.2,QCSC-v1|8.2.1,TBA-FIISB|43.1" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - allowPromiscuous = " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - allowPromiscuous = NOT configured" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "allowPromiscuous =" expect : "allowPromiscuous = FALSE$" type : AUDIT_ESX description : "7.4 Ensure port groups are not configured to the value of the native VLAN" info : "ESXi does not use the concept of native VLAN, so do not configure port groups to use the native VLAN ID. If the default value of 1 for the native VLAN is being used, the ESXi Server virtual switch port groups should be configured with any value between 2 and 4094. Otherwise, ensure that the port group is not configured to use whatever value is set for the native VLAN. Rationale: Frames with VLAN specified in the port group will have a tag, but frames without a VLAN specified in the port group are not tagged and therefore will end up as belonging to the native VLAN of the physical switch. For example, frames on VLAN 1 from a Cisco physical switch will be untagged, because this is considered as the native VLAN. However, frames from ESXi specified as VLAN 1 will be tagged with a '1'; therefore, traffic from ESXi that is destined for the native VLAN will not be correctly routed (because it is tagged with a '1' instead of being untagged), and traffic from the physical switch coming from the native VLAN will not be visible (because it is not tagged). If the ESXi virtual switch port group uses the native VLAN ID, traffic from those VMs will not be visible to the native VLAN on the switch, because the switch is expecting untagged traffic. NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance." solution : "To stop using the native VLAN ID for port groups, perform the following: From the vSphere Web Client, select the host. Click Configure then expand Networking. Select Virtual switches. Expand the Standard vSwitch. View the topology diagram of the switch, which shows the various port groups associated with that switch. For each port group on the vSwitch, verify and record the VLAN IDs used. If a VLAN ID change is needed, click the name of the port group in the topology diagram of the virtual switch. Click the Edit settings option. In the Properties section, enter an appropriate name in the Network label field. In the VLAN ID dropdown select or type a new VLAN. Click OK." reference : "800-171|3.1.1,800-171|3.13.1,800-171|3.13.5,800-53|AC-3,800-53|SC-7,CIS_Recommendation|7.4,CN-L3|8.1.4.2(f),CN-L3|8.1.4.11(b),CN-L3|8.1.10.2(c),CN-L3|8.1.10.6(j),CN-L3|8.5.3.1,CN-L3|8.5.4.1(a),CSCv7|9.2,CSCv7|12.4,CSCv8|4.4,CSF|DE.CM-1,CSF|PR.AC-4,CSF|PR.AC-5,CSF|PR.DS-5,CSF|PR.PT-3,CSF|PR.PT-4,ISO/IEC-27001|A.9.4.1,ISO/IEC-27001|A.9.4.5,ISO/IEC-27001|A.13.1.3,ITSG-33|AC-3,ITSG-33|SC-7,LEVEL|1A,NESA|T4.2.1,NESA|T4.5.4,NESA|T5.4.4,NESA|T5.4.5,NESA|T5.5.4,NESA|T5.6.1,NESA|T7.5.2,NESA|T7.5.3,NIAv2|AM3,NIAv2|GS1,NIAv2|GS2a,NIAv2|GS2b,NIAv2|SS29,QCSC-v1|3.2,QCSC-v1|5.2.1,QCSC-v1|5.2.2,QCSC-v1|6.2,QCSC-v1|8.2.1,QCSC-v1|13.2,TBA-FIISB|31.1,TBA-FIISB|43.1" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - vlanId = " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - vlanId = NOT configured" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" severity : MEDIUM type : AUDIT_ESX description : "7.5 Ensure port groups are not configured to VLAN values reserved by upstream physical switches" info : "Ensure that port groups are not configured to VLAN values reserved by upstream physical switches. Certain physical switches reserve certain VLAN IDs for internal purposes and often disallow traffic configured to these values. For example, Cisco Catalyst switches typically reserve VLANs 1001 through 1024 and 4094, while Nexus switches typically reserve 3968 through 4047 and 4094. Check the documentation for your specific switch. Rationale: Using a reserved VLAN might result in a denial of service on the network. NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance." solution : "To change the VLAN values for port groups to non-reserved values, perform the following: From the vSphere Web Client, select the host. Click Configure then expand Networking. Select Virtual switches. Expand the Standard vSwitch. View the topology diagram of the switch, which shows the various port groups associated with that switch. For each port group on the vSwitch, verify and record the VLAN IDs used. If a VLAN ID change is needed, click the name of the port group in the topology diagram of the virtual switch. Click the Edit settings option. In the Properties section, enter an appropriate name in the Network label field. In the VLAN ID dropdown select or type a new VLAN. Click OK." reference : "800-171|3.1.1,800-171|3.13.1,800-171|3.13.5,800-53|AC-3,800-53|SC-7,CIS_Recommendation|7.5,CN-L3|8.1.4.2(f),CN-L3|8.1.4.11(b),CN-L3|8.1.10.2(c),CN-L3|8.1.10.6(j),CN-L3|8.5.3.1,CN-L3|8.5.4.1(a),CSCv7|9.2,CSCv7|12.4,CSCv8|4.4,CSF|DE.CM-1,CSF|PR.AC-4,CSF|PR.AC-5,CSF|PR.DS-5,CSF|PR.PT-3,CSF|PR.PT-4,ISO/IEC-27001|A.9.4.1,ISO/IEC-27001|A.9.4.5,ISO/IEC-27001|A.13.1.3,ITSG-33|AC-3,ITSG-33|SC-7,LEVEL|1M,NESA|T4.2.1,NESA|T4.5.4,NESA|T5.4.4,NESA|T5.4.5,NESA|T5.5.4,NESA|T5.6.1,NESA|T7.5.2,NESA|T7.5.3,NIAv2|AM3,NIAv2|GS1,NIAv2|GS2a,NIAv2|GS2b,NIAv2|SS29,QCSC-v1|3.2,QCSC-v1|5.2.1,QCSC-v1|5.2.2,QCSC-v1|6.2,QCSC-v1|8.2.1,QCSC-v1|13.2,TBA-FIISB|31.1,TBA-FIISB|43.1" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - vlanId = " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - vlanId = NOT configured" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" severity : MEDIUM type : AUDIT_ESX description : "7.6 Ensure port groups are not configured to VLAN 4095 and 0 except for Virtual Guest Tagging (VGT)" info : "Port groups should not be configured to VLAN 4095 or 0 except for Virtual Guest Tagging (VGT). When a port group is set to VLAN 4095, this activates VGT mode. In this mode, the vSwitch passes all network frames to the guest virtual machine without modifying the VLAN tags, leaving it up to the guest to deal with them. VLAN 4095 should be used only if the guest has been specifically configured to manage VLAN tags itself. Rationale: If VGT is enabled inappropriately, it might cause a denial of service or allow a guest virtual machine to interact with traffic on an unauthorized VLAN." solution : "To set port groups to values other than 4095 and 0 unless VGT is required, perform the following: From the vSphere Web Client, select the host. Click Configure then expand Networking. Select Virtual switches. Expand the Standard vSwitch. View the topology diagram of the switch, which shows the various port groups associated with that switch. For each port group on the vSwitch, verify and record the VLAN IDs used. If a VLAN ID change is needed, click the name of the port group in the topology diagram of the virtual switch. Click the Edit settings option. In the Properties section, enter an appropriate name in the Network label field. In the VLAN ID dropdown select or type a new VLAN. Click OK." reference : "800-171|3.4.2,800-53|CM-6b.,CIS_Recommendation|7.6,CN-L3|8.1.10.6(d),CSCv7|9.2,CSCv7|12.4,CSCv8|4.4,CSF|PR.IP-1,ITSG-33|CM-6b.,LEVEL|1A,NESA|T3.2.1,SWIFT-CSCv1|2.3" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - vlanId = " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " - vlanId = NOT configured" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "vlanId =" not_expect : "vlanId = 4095$" description : "7.7 Ensure Virtual Distributed Switch Netflow traffic is sent to an authorized collector" info : "The vSphere VDS can export Netflow information about traffic crossing the VDS. These exports are not encrypted and can contain information about the virtual network making it easier for a Man in the Middle attack to be executed successfully. NOTE: This is only valid if utilizing VMware vCenter Rationale: If Netflow export is required, verify that all VDS Netflow target systems are approved collectors by confirming the IP's are set correctly. NOTE: This is only valid if utilizing VMware vCenter NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance." solution : "Using the vSphere Web Client Go to the Networking section of vCenter After selecting each individual switch you will need to perform the following. Go to Configure then expand Settings. Click on Netflow. Click on Edit. Enter the Collector IP address and Collector port as required. Click OK. Additionally, the following PowerCLI command may be used '# Disable Netfow for a VDPortgroup $DPortgroup = Get-VDPortgroup $DPortGroup | Disable-PGNetflow #Function for Disable-PGNetflow #From: http://www.virtu-al.net/2013/07/23/disabling-netflow-with-powercli/ Function Disable-PGNetflow { [CmdletBinding()] Param ( [Parameter(ValueFromPipeline=$true)] $DVPG ) Process { Foreach ($PG in $DVPG) { $spec = New-Object VMware.Vim.DVPortgroupConfigSpec $spec.configversion = $PG.Extensiondata.Config.ConfigVersion $spec.defaultPortConfig = New-Object VMware.Vim.VMwareDVSPortSetting $spec.defaultPortConfig.ipfixEnabled = New-Object VMware.Vim.BoolPolicy $spec.defaultPortConfig.ipfixEnabled.inherited = $false $spec.defaultPortConfig.ipfixEnabled.value = $false $PGView = Get-View -Id $PG.Id $PGView.ReconfigureDVPortgroup_Task($spec) } } }" reference : "800-53|SC-7,CSCv7|12.8,CSCv8|13.6,LEVEL|1M,CIS_Recommendation|7.7" see_also : "https://workbench.cisecurity.org/files/3473" description : "7.8 Ensure port-level configuration overrides are disabled." info : "Port-level configuration overrides are disabled by default. Once enabled, it allows for different security to be set ignoring what is set at the Port-Group level. Rationale: There are cases where unique configurations are needed, but this should be monitored so it is only used when authorized. If overrides are not monitored, anyone who gains access to a VM with a less secure VDS configuration could secretly exploit the broader access. NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance." solution : "Using the vSphere Web Client, Go to the Networking section of vCenter After expanding each individual switch you will need to perform the following for each PortGroup. Go to Configure then expand Settings. Click on Properties then click on Edit. Select Advanced then under Override port policies set each to Disabled. Click OK." reference : "800-53|SC-7,CSCv7|12.4,CSCv7|9.2,CSCv8|4.4,LEVEL|1A,CIS_Recommendation|7.8" see_also : "https://workbench.cisecurity.org/files/3473" type : AUDIT_VM description : "8.1.1 Ensure informational messages from the VM to the VMX file are limited" info : "Limit informational messages from the virtual machine (VM) to the virtual machine extensions (VMX) file to avoid filling the datastore. The configuration file containing these name-value pairs is limited to a size of 1 MB by default. This should be sufficient for most cases, but you can change this value if necessary, such as if large amounts of custom information are being stored in the configuration file. Rationale: Filling the datastore with informational messages from the VM to the VMX file could cause a denial of service." solution : "Set this configuration as follows: Run the following PowerCLI command: # Add the setting to all VMs Get-VM | New-AdvancedSetting -Name 'tools.setInfo.sizeLimit' -value 1048576 Default Value: 1048576" reference : "800-53|AU-4,CIS_Recommendation|8.1.1,CSCv7|6.4,CSCv8|8.3,CSF|PR.DS-4,CSF|PR.PT-1,ITSG-33|AU-4,LEVEL|1A,NESA|T3.3.1,NESA|T3.6.2,QCSC-v1|8.2.1,QCSC-v1|13.2" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - tools.setInfo.sizeLimit : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - tools.setInfo.sizeLimit : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - tools.setInfo.sizeLimit : NOT configured " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - tools.setInfo.sizeLimit : NOT configured " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "tools\.setInfo\.sizeLimit : " expect : "tools\.setInfo\.sizeLimit : 1048576$" type : AUDIT_VM description : "8.2.1 Ensure unnecessary floppy devices are disconnected" info : "Ensure that no floppy device is connected to a virtual machine unless required. For a floppy device to be disconnected, the floppyX.present parameter should either not be present or have a value of FALSE. Rationale: Removing unnecessary hardware devices can reduce the number of potential attack channels and help prevent attacks." solution : "To disconnect all floppy drives from VMs, run the following PowerCLI command: # Remove all Floppy drives attached to VMs Get-VM | Get-FloppyDrive | Remove-FloppyDrive The VM will need to be powered off for this change to take effect." reference : "800-171|3.8.7,800-53|MP-7,CIS_Recommendation|8.2.1,CN-L3|8.5.4.1(c),CSCv7|9.2,CSCv8|4.8,CSF|PR.PT-2,ISO/IEC-27001|A.8.3.1,ISO/IEC-27001|A.8.3.3,LEVEL|1A,NESA|T1.4.1" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - floppyX.present : NOT found " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - floppyX.present : NOT found " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "floppy([Xx]|[0-9]+)\.present :" expect : "floppy[a-zA-Z0-9]\.present : (False|NOT found)$" type : AUDIT_VM description : "8.2.3 Ensure unnecessary parallel ports are disconnected" info : "Ensure that no parallel port is connected to a virtual machine unless required. For a parallel port to be disconnected, the parallelX.present parameter should either not be present or have a value of FALSE. Rationale: Removing unnecessary hardware devices can reduce the number of potential attack channels and help prevent attacks." solution : "To disconnect all parallel ports from VMs, run the following PowerCLI command: # In this Example you will need to add the functions from this post: http://blogs.vmware.com/vipowershell/2012/05/working-with-vm-devices-in-powercli.html # Remove all Parallel Ports attached to VMs Get-VM | Get-ParallelPort | Remove-ParallelPort The VM will need to be powered off for this change to take effect." reference : "800-171|3.4.6,800-171|3.4.7,800-53|CM-7,CIS_Recommendation|8.2.3,CSCv7|9.2,CSCv8|4.8,CSF|PR.IP-1,CSF|PR.PT-3,ITSG-33|CM-7,LEVEL|1A,NIAv2|SS15a,SWIFT-CSCv1|2.3" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - parallelX.present : NOT found " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - parallelX.present : NOT found " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "parallel([Xx]|[0-9]+)\.present :" expect : "parallel([Xx]|[0-9]+)\.present : (False|NOT found)$" type : AUDIT_VM description : "8.2.4 Ensure unnecessary serial ports are disconnected" info : "Ensure that no serial port is connected to a virtual machine unless required. For a serial port to be disconnected, the serialX.present parameter should either not be present or have a value of FALSE. Rationale: Removing unnecessary hardware devices can reduce the number of potential attack channels and help prevent attacks." solution : "To disconnect all serial ports from VMs, run the following PowerCLI command: # In this Example you will need to add the functions from this post: http://blogs.vmware.com/vipowershell/2012/05/working-with-vm-devices-in-powercli.html # Remove all Serial Ports attached to VMs Get-VM | Get-SerialPort | Remove-SerialPort The VM will need to be powered off for this change to take effect." reference : "800-171|3.4.6,800-171|3.4.7,800-53|CM-7,CIS_Recommendation|8.2.4,CSCv7|9.2,CSCv8|4.8,CSF|PR.IP-1,CSF|PR.PT-3,ITSG-33|CM-7,LEVEL|1A,NIAv2|SS15a,SWIFT-CSCv1|2.3" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - serialX.present : NOT found " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - serialX.present : NOT found " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "serial([Xx]|[0-9]+)\.present :" expect : "serial([Xx]|[0-9]+)\.present : (False|NOT found)$" type : AUDIT_VM description : "8.2.5 Ensure unnecessary USB devices are disconnected" info : "Ensure that no USB device is connected to a virtual machine unless required. For a USB device to be disconnected, the usb.present parameter should either not be present or have a value of FALSE. Rationale: Removing unnecessary hardware devices can reduce the number of potential attack channels and help prevent attacks." solution : "To disconnect all USB devices from VMs, run the following PowerCLI command: # Remove all USB Devices attached to VMs Get-VM | Get-USBDevice | Remove-USBDevice The VM will need to be powered off for this change to take effect." reference : "800-171|3.4.6,800-171|3.4.7,800-53|CM-7,CIS_Recommendation|8.2.5,CSCv7|9.2,CSCv8|4.8,CSF|PR.IP-1,CSF|PR.PT-3,ITSG-33|CM-7,LEVEL|1A,NIAv2|SS15a,SWIFT-CSCv1|2.3" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - Virtual USB Controller : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - Virtual USB Controller : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - Virtual USB Controller : NOT found " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - Virtual USB Controller : NOT found " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "Virtual USB Controller :" expect : "Virtual USB Controller : (False|NOT found)$" type : AUDIT_VM description : "8.2.6 Ensure unauthorized modification and disconnection of devices is disabled" info : "In a virtual machine, users and processes without root or administrator privileges can disconnect devices, such as network adapters and CD-ROM drives, and modify device settings within the guest operating system. These actions should be prevented. Rationale: Disabling unauthorized modification and disconnection of devices helps prevents unauthorized changes within the guest operating system, which could be used to gain unauthorized access, cause denial of service conditions, and otherwise negatively affect the security of the guest operating system." solution : "To prevent unauthorized device modifications and disconnections, run the following PowerCLI command: # Add the setting to all VMs Get-VM | New-AdvancedSetting -Name 'isolation.device.edit.disable' -value $true" reference : "800-171|3.1.7,800-53|AC-6(10),CIS_Recommendation|8.2.6,CN-L3|7.1.3.2(b),CN-L3|7.1.3.2(g),CN-L3|8.1.4.2(d),CN-L3|8.1.10.6(a),CSCv7|9.2,CSCv8|4.8,CSF|PR.AC-4,ITSG-33|AC-6,LEVEL|1A,NESA|T5.1.1,NESA|T5.2.2,NESA|T5.4.1,NESA|T5.4.4,NESA|T5.4.5,NESA|T5.5.4,NESA|T5.6.1,NESA|T7.5.3,NIAv2|AM1,NIAv2|AM23f,NIAv2|SS13c,NIAv2|SS15c,QCSC-v1|5.2.2,QCSC-v1|6.2,SWIFT-CSCv1|5.1,TBA-FIISB|31.4.2,TBA-FIISB|31.4.3" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - isolation.device.edit.disable : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - isolation.device.edit.disable : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - isolation.device.edit.disable : NOT found " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - isolation.device.edit.disable : NOT found " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "isolation\.device\.edit\.disable : " expect : "isolation\.device\.edit\.disable : TRUE$" type : AUDIT_VM description : "8.2.7 Ensure unauthorized connection of devices is disabled" info : "In a virtual machine, users and processes without root or administrator privileges can connect devices, such as network adapters and CD-ROM drives. This should be prevented. Rationale: Disabling unauthorized connection of devices helps prevents unauthorized changes within the guest operating system, which could be used to gain unauthorized access, cause denial of service conditions, and otherwise negatively affect the security of the guest operating system." solution : "To prevent unauthorized device connections, run the following PowerCLI command: # Add the setting to all VMs Get-VM | New-AdvancedSetting -Name 'isolation.device.connectable.disable' -value $true" reference : "800-171|3.1.7,800-53|AC-6(10),CIS_Recommendation|8.2.7,CN-L3|7.1.3.2(b),CN-L3|7.1.3.2(g),CN-L3|8.1.4.2(d),CN-L3|8.1.10.6(a),CSCv7|9.2,CSCv8|4.8,CSF|PR.AC-4,ITSG-33|AC-6,LEVEL|1A,NESA|T5.1.1,NESA|T5.2.2,NESA|T5.4.1,NESA|T5.4.4,NESA|T5.4.5,NESA|T5.5.4,NESA|T5.6.1,NESA|T7.5.3,NIAv2|AM1,NIAv2|AM23f,NIAv2|SS13c,NIAv2|SS15c,QCSC-v1|5.2.2,QCSC-v1|6.2,SWIFT-CSCv1|5.1,TBA-FIISB|31.4.2,TBA-FIISB|31.4.3" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - isolation.device.connectable.disable : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - isolation.device.connectable.disable : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - isolation.device.connectable.disable : NOT found " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - isolation.device.connectable.disable : NOT found " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "isolation\.device\.connectable\.disable : " expect : "isolation\.device\.connectable\.disable : True$" type : AUDIT_VM description : "8.2.8 Ensure PCI and PCIe device passthrough is disabled" info : "Using the VMware DirectPath I/O feature to pass through a PCI or PCIe device to a virtual machine can result in a potential security vulnerability. Rationale: The vulnerability can be triggered by buggy or malicious code running in privileged mode in the guest OS, such as a device driver." solution : "The following PowerCLI command can be used: # Add the setting to all VMs Get-VM | New-AdvancedSetting -Name 'pciPassthru*.present' -value ''" reference : "800-171|3.4.6,800-171|3.4.7,800-53|CM-7b.,CIS_Recommendation|8.2.8,CN-L3|7.1.3.5(c),CN-L3|7.1.3.7(d),CN-L3|8.1.4.4(b),CSCv7|9.2,CSCv8|4.8,CSF|PR.IP-1,CSF|PR.PT-3,ITSG-33|CM-7a.,LEVEL|1A,NIAv2|SS13b,NIAv2|SS14a,NIAv2|SS14c,QCSC-v1|3.2,SWIFT-CSCv1|2.3" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - pciPassthru*.present : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - pciPassthru*.present : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - pciPassthru*.present : NOT found " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - pciPassthru*.present : NOT found " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "pciPassthru.*\.present : " expect : "pciPassthru.*\.present : NOT found$" description : "8.3.1 Ensure unnecessary or superfluous functions inside VMs are disabled" info : "Disable all system components that are not needed to support the application or service running on the VM. VMs often don't require as many functions as ordinary physical servers, so when virtualizing, you should evaluate whether a particular function is truly needed. Rationale: By disabling unnecessary system components, you reduce the number of potential attack vectors, which reduces the likelihood of compromise. NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance." solution : "To disable unneeded functions, perform whichever of the following steps are applicable: Disable unused services in the operating system. Disconnect unused physical devices, such as CD/DVD drives, floppy drives, and USB adaptors. Turn off any screen savers. If using a Linux, BSD, or Solaris guest operating system, do not run the X Windows system unless it is necessary." reference : "800-53|SC-7,CSCv7|9.2,CSCv8|4.8,LEVEL|1M,CIS_Recommendation|8.3.1" see_also : "https://workbench.cisecurity.org/files/3473" description : "8.3.2 Ensure use of the VM console is limited" info : "The VM console enables you to connect to the console of a VM, in effect seeing what a monitor on a physical server would show. The VM console also provides power management and removable device connectivity controls. Instead of the VM console, use native remote management services, such as terminal services and ssh, to interact with VMs. Grant access to the VM console only when needed, and use custom roles to provide fine-grained permissions for those people who do need access. By default, the vCenter roles 'Virtual Machine Power User' and 'Virtual Machine Administrator' have the 'Virtual Machine.Interaction.Console Interaction' privilege. Rationale: The VM console could be misused to eavesdrop on VM activity, cause VM outages, and negatively affect the performance of the console, especially if many VM console sessions are open simultaneously. NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance." solution : "To properly limit use of the VM console, perform the following steps: From within vCenter select Menu go to Administration then Roles. Create a custom role then choose the pencil icon to edit the new role. Give the appropriate permissions. View the usage and privileges as required. Remove any default Admin or Power User roles then assign the new custom roles as needed." reference : "800-53|IA-8(2),CSCv7|16.1,CSCv8|4.1,LEVEL|1M,CIS_Recommendation|8.3.2" see_also : "https://workbench.cisecurity.org/files/3473" description : "8.3.3 Ensure secure protocols are used for virtual serial port access" info : "Serial ports are interfaces for connecting peripherals to the VM. They are often used on physical systems to provide a direct, low-level connection to the console of a server. Virtual serial ports allow VMs to communicate with serial ports over networks. If virtual serial ports are needed, they should be configured to use secure protocols. Rationale: If virtual serial ports do not use secure protocols, the communications with those ports could be eavesdropped on, manipulated, or otherwise compromised, giving attackers sensitive information or control to unauthorized parties. NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance." solution : "To configure all virtual serial ports to use secure protocols, change any protocols that are not secure to one of the following: ssl - the equivalent of TCP+SSL tcp+ssl - SSL over TCP over IPv4 or IPv6 tcp4+ssl - SSL over TCP over IPv4 tcp6+ssl - SSL over TCP over IPv6 telnets - telnet over SSL over TCP" reference : "800-53|SC-7(3),CSCv7|12.4,CSCv8|4.6,LEVEL|1M,CIS_Recommendation|8.3.3" see_also : "https://workbench.cisecurity.org/files/3473" description : "8.3.4 Ensure standard processes are used for VM deployment" info : "Have a standard process for VM deployment whether this is a VMware template or another means to ensure Operating Systems have the appropriate security controls. Refer to CIS Benchmarks for information in regards to specific Operating System hardening. Rationale: By utilizing a standard deployment process and having hardened templates you can ensure that all your virtual machines are created with a known baseline level of security. NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance." solution : "Create documentation and a standard process for the method for VM deployment. If utilizing templates in VMware create the templates, document the process for using them as well as keeping them up-to-date, then ensure the process is followed accordingly through periodic review." reference : "800-53|CM-2,CSCv7|5.1,CSCv7|5.2,CSCv8|4.1,LEVEL|1M,CIS_Recommendation|8.3.4" see_also : "https://workbench.cisecurity.org/files/3473" type : AUDIT_VM description : "8.4.1 Ensure access to VMs through the dvfilter network APIs is configured correctly" info : "A VM must be configured explicitly to accept access by the dvfilter network API. Only VMs that need to be accessed by that API should be configured to accept such access. Rationale: An attacker might compromise a VM by making use of the dvfilter API. NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance." solution : "To set this configuration utilize the vSphere interface as follows: Select the VM then select Actions followed by Edit Settings. Click on the VM Options tab then expand Advanced. Click on EDIT CONFIGURATION. Remove the value from ethernet0.filter1.name = dv-filter. Parameters are removed when no value is present Click OK. You may also configure a VM to allow dvfilter access via the following method in the VMX file: Configure the following in the VMX file: ethernet0.filter1.name = dv-filter1 where ethernet0 is the network adapter interface of the virtual machine that is to be protected, filter1 is the number of the filter that is being used, and dv-filter1 is the name of the particular data path kernel module that is protecting the VM. If dvfilter access should not be permitted: Remove the following from its VMX file: ethernet0.filter1.name = dv-filter1. Set the name of the data path kernel correctly." reference : "800-171|3.13.1,800-171|3.13.5,800-53|SC-7,CIS_Recommendation|8.4.1,CN-L3|8.1.10.6(j),CSCv7|9.2,CSCv7|12.4,CSCv8|4.1,CSF|DE.CM-1,CSF|PR.AC-5,CSF|PR.DS-5,CSF|PR.PT-4,ISO/IEC-27001|A.13.1.3,ITSG-33|SC-7,LEVEL|1M,NESA|T4.5.4,NIAv2|GS1,NIAv2|GS2a,NIAv2|GS2b,QCSC-v1|5.2.1,QCSC-v1|5.2.2,QCSC-v1|6.2,QCSC-v1|8.2.1,TBA-FIISB|43.1" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - ethernetn.filtern.name : NOT configured " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - ethernetn.filtern.name : NOT configured " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" severity : MEDIUM type : AUDIT_VM description : "8.4.21 Ensure VM Console Copy operations are disabled" info : "VM console copy operations should be disabled. Rationale: VM console copy operations are disabled by default (not explicitly specified); however, explicitly disabling this feature enables audit controls to check that this setting is correct." solution : "To set this configuration utilize the vSphere interface as follows: Select the VM then select Actions followed by Edit Settings. Click on the VM Options tab then expand Advanced. Click on EDIT CONFIGURATION. Click on ADD CONFIGURATION PARAMS then input isolation.tools.copy.disable with a value of TRUE. Click OK, then OK again. To explicitly disable VM console copy operations, run the following PowerCLI command: # Add the setting to all VMs Get-VM | New-AdvancedSetting -Name 'isolation.tools.copy.disable' -value $true Default Value: Disabled" reference : "800-171|3.4.6,800-171|3.4.7,800-53|CM-7,CIS_Recommendation|8.4.21,CSCv7|9.2,CSCv8|4.8,CSF|PR.IP-1,CSF|PR.PT-3,ITSG-33|CM-7,LEVEL|1A,NIAv2|SS15a,SWIFT-CSCv1|2.3" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - isolation.tools.copy.disable : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - isolation.tools.copy.disable : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - isolation.tools.copy.disable : NOT configured " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - isolation.tools.copy.disable : NOT configured " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "isolation\.tools\.copy\.disable : " expect : "isolation\.tools\.copy\.disable : TRUE$" type : AUDIT_VM description : "8.4.22 Ensure VM Console Drag and Drop operations is disabled" info : "VM console drag and drop operations should be disabled. Rationale: VM console drag and drop operations are disabled by default (not explicitly specified); however, explicitly disabling this feature enables audit controls to check that this setting is correct." solution : "To set this configuration utilize the vSphere interface as follows: Select the VM then select Actions followed by Edit Settings. Click on the VM Options tab then expand Advanced. Click on EDIT CONFIGURATION. Click on ADD CONFIGURATION PARAMS then input isolation.tools.dnd.disable with a value of TRUE. Click OK, then OK again. To explicitly disable VM console drag and drop operations, run the following PowerCLI command: # Add the setting to all VMs Get-VM | New-AdvancedSetting -Name 'isolation.tools.dnd.disable' -value $true Default Value: Disabled" reference : "800-171|3.4.6,800-171|3.4.7,800-53|CM-7,CIS_Recommendation|8.4.22,CSCv7|9.2,CSCv8|4.8,CSF|PR.IP-1,CSF|PR.PT-3,ITSG-33|CM-7,LEVEL|1A,NIAv2|SS15a,SWIFT-CSCv1|2.3" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - isolation.tools.dnd.disable : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - isolation.tools.dnd.disable : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - isolation.tools.dnd.disable : NOT configured " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - isolation.tools.dnd.disable : NOT configured " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "isolation\.tools\.dnd\.disable : " expect : "isolation\.tools\.dnd\.disable : TRUE$" type : AUDIT_VM description : "8.4.23 Ensure VM Console GUI Options is disabled" info : "VM console and paste GUI options should be disabled. Rationale: VM console and paste GUI options are disabled by default (not explicitly specified); however, explicitly disabling this feature enables audit controls to check that this setting is correct." solution : "To set this configuration utilize the vSphere interface as follows: Select the VM then select Actions followed by Edit Settings. Click on the VM Options tab then expand Advanced. Click on EDIT CONFIGURATION. Click on ADD CONFIGURATION PARAMS then input isolation.tools.setGUIOptions.enable with a value of FALSE. Click OK, then OK again. To explicitly disable VM console and paste GUI options, run the following PowerCLI command: # Add the setting to all VMs Get-VM | New-AdvancedSetting -Name 'isolation.tools.setGUIOptions.enable' -value $false Default Value: Disabled" reference : "800-171|3.4.6,800-171|3.4.7,800-53|CM-7,CIS_Recommendation|8.4.23,CSCv7|9.2,CSCv8|4.8,CSF|PR.IP-1,CSF|PR.PT-3,ITSG-33|CM-7,LEVEL|1A,NIAv2|SS15a,SWIFT-CSCv1|2.3" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - isolation.tools.setGUIOptions.enable : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - isolation.tools.setGUIOptions.enable : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - isolation.tools.setGUIOptions.enable : NOT configured " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - isolation.tools.setGUIOptions.enable : NOT configured " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "isolation\.tools\.setGUIOptions\.enable : " expect : "isolation\.tools\.setGUIOptions\.enable : FALSE$" type : AUDIT_VM description : "8.4.24 Ensure VM Console Paste operations are disabled" info : "VM console paste operations should be disabled. Rationale: VM console paste operations are disabled by default (not explicitly specified); however, explicitly disabling this feature enables audit controls to check that this setting is correct." solution : "To set this configuration utilize the vSphere interface as follows: Select the VM then select Actions followed by Edit Settings. Click on the VM Options tab then expand Advanced. Click on EDIT CONFIGURATION. Click on ADD CONFIGURATION PARAMS then input isolation.tools.paste.disable with a value of TRUE. Click OK, then OK again. To explicitly disable VM console paste operations, run the following PowerCLI command: # Add the setting to all VMs Get-VM | New-AdvancedSetting -Name 'isolation.tools.paste.disable' -value $true Default Value: Disabled" reference : "800-171|3.4.6,800-171|3.4.7,800-53|CM-7,CIS_Recommendation|8.4.24,CSCv7|9.2,CSCv8|4.8,CSF|PR.IP-1,CSF|PR.PT-3,ITSG-33|CM-7,LEVEL|1A,NIAv2|SS15a,SWIFT-CSCv1|2.3" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - isolation.tools.paste.disable : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - isolation.tools.paste.disable : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - isolation.tools.paste.disable : NOT configured " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - isolation.tools.paste.disable : NOT configured " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "isolation\.tools\.paste\.disable : " expect : "isolation\.tools\.paste\.disable : TRUE$" type : AUDIT_VM description : "8.6.2 Ensure virtual disk shrinking is disabled" info : "If Virtual disk shrinking is done repeatedly it will cause the virtual disk to become unavailable resulting in a denial of service. You can prevent virtual disk shrinking by disabling it. Rationale: Shrinking a virtual disk reclaims unused space in it. If there is empty space in the disk, this process reduces the amount of space the virtual disk occupies on the host drive. Normal users and processes-that is, users and processes without root or administrator privileges-within virtual machines have the capability to invoke this procedure. However, if this is done repeatedly, the virtual disk can become unavailable while this shrinking is being performed, effectively causing a denial of service. In most datacenter environments, disk shrinking is not done, so you should disable this feature. Repeated disk shrinking can make a virtual disk unavailable. This capability is available to nonadministrative users in the guest. Impact: Inability to shrink virtual machine disks in the event that a datastore runs out of space." solution : "To set this configuration utilize the vSphere interface as follows: Select the VM then select Actions followed by Edit Settings. Click on the VM Options tab then expand Advanced. Click on EDIT CONFIGURATION. Click on ADD CONFIGURATION PARAMS then input isolation.tools.diskShrink.disable with a value of TRUE. Click OK, then OK again. To implement the recommended configuration state, run the following PowerCLI command: # Add the setting to all VMs Get-VM | New-AdvancedSetting -Name 'isolation.tools.diskShrink.disable' -value $true Default Value: The prescribed state is not the default state." reference : "800-171|3.4.6,800-171|3.4.7,800-53|CM-7,CIS_Recommendation|8.6.2,CSCv7|5.1,CSCv8|4.1,CSF|PR.IP-1,CSF|PR.PT-3,ITSG-33|CM-7,LEVEL|1A,NIAv2|SS15a,SWIFT-CSCv1|2.3" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - isolation.tools.diskShrink.disable : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - isolation.tools.diskShrink.disable : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - isolation.tools.diskShrink.disable : NOT configured " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - isolation.tools.diskShrink.disable : NOT configured " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "isolation\.tools\.diskShrink\.disable : " expect : "isolation\.tools\.diskShrink\.disable : TRUE$" type : AUDIT_VM description : "8.6.3 Ensure virtual disk wiping is disabled" info : "Wiping a virtual disk reclaims all unused space in it. If there is empty space in the disk, this process reduces the amount of space the virtual disk occupies on the host drive. If virtual disk wiping is done repeatedly, it can cause the virtual disk to become unavailable while wiping occurs. In most datacenter environments, disk wiping is not needed, but normal users and processes--without administrative privileges--can issue disk wipes unless the feature is disabled. Rationale: Virtual disk wiping can effectively cause a denial of service." solution : "To set this configuration utilize the vSphere interface as follows: Select the VM then select Actions followed by Edit Settings. Click on the VM Options tab then expand Advanced. Click on EDIT CONFIGURATION. Click on ADD CONFIGURATION PARAMS then input isolation.tools.diskWiper.disable with a value of TRUE. Click OK, then OK again. To disable virtual disk wiping, run the following PowerCLI command: # Add the setting to all VMs Get-VM | New-AdvancedSetting -Name 'isolation.tools.diskWiper.disable' -value $true" reference : "800-171|3.4.6,800-171|3.4.7,800-53|CM-7,CIS_Recommendation|8.6.3,CSCv7|9.1,CSCv8|4.1,CSF|PR.IP-1,CSF|PR.PT-3,ITSG-33|CM-7,LEVEL|1A,NIAv2|SS15a,SWIFT-CSCv1|2.3" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - isolation.tools.diskWiper.disable : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - isolation.tools.diskWiper.disable : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - isolation.tools.diskWiper.disable : NOT found " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - isolation.tools.diskWiper.disable : NOT found " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "isolation\.tools\.diskWiper\.disable : " expect : "isolation\.tools\.diskWiper\.disable : True$" type : AUDIT_VM description : "8.7.1 Ensure the number of VM log files is configured properly" info : "Normally a new log file is created only when a host is rebooted, so the file can grow to be quite large. You can ensure that new log files are created more frequently by limiting the maximum size of the log files. If you want to restrict the total size of logging data, VMware recommends saving 10 log files, each one limited to 1 MB. Each time an entry is written to the log, the size of the log is checked; if it is over the limit, the next entry is written to a new log. If the maximum number of log files already exists, when a new one is created, the oldest log file is deleted. Rationale: Log files should be rotated to preserve log data in case of corruption or destruction of the current log file, and to avoid the likelihood of logging issues caused by an overly large log file. Impact: A more extreme strategy is to disable logging altogether for the virtual machine. Disabling logging makes troubleshooting challenging and support difficult. Do not consider disabling logging unless the log file rotation approach proves insufficient." solution : "To set this configuration utilize the vSphere interface as follows: Select the VM then select Actions followed by Edit Settings. Click on the VM Options tab then expand Advanced. Click on EDIT CONFIGURATION. Click on ADD CONFIGURATION PARAMS then input log.keepOld with a value of 10. Click OK, then OK again. To set the number of log files to be used to 10, run the following PowerCLI command: # Add the setting to all VMs Get-VM | New-AdvancedSetting -Name 'log.keepOld' -value '10'" reference : "800-53|AU-4,CIS_Recommendation|8.7.1,CSCv7|6.4,CSCv8|8.3,CSF|PR.DS-4,CSF|PR.PT-1,ITSG-33|AU-4,LEVEL|1A,NESA|T3.3.1,NESA|T3.6.2,QCSC-v1|8.2.1,QCSC-v1|13.2" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - log.keepOld : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - log.keepOld : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - log.keepOld : NOT found " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - log.keepOld : NOT found " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "log\.keepOld : " expect : "log\.keepOld : 10$" type : AUDIT_VM description : "8.7.3 Ensure VM log file size is limited" info : "Normally a new log file is created only when a host is rebooted, so the file can grow to be quite large. You can ensure that new log files are created more frequently by limiting the maximum size of the log files. If you want to restrict the total size of logging data, VMware recommends saving 10 log files, each one limited to 1 MB. If the maximum number of log files already exists, when a new one is created, the oldest log file is deleted. Rationale: Virtual machine users and processes can abuse logging either on purpose or inadvertently so that large amounts of data flood the log file. Without restrictions on maximum log file size, over time a log file can consume enough file system space to cause a denial of service. Impact: A more extreme strategy is to disable logging altogether for the virtual machine. Disabling logging makes troubleshooting challenging and support difficult. Do not consider disabling logging unless the log file rotation approach proves insufficient." solution : "To set this configuration utilize the vSphere interface as follows: Select the VM then select Actions followed by Edit Settings. Click on the VM Options tab then expand Advanced. Click on EDIT CONFIGURATION. Click on ADD CONFIGURATION PARAMS then input log.rotateSize with a value of 1024000. Click OK, then OK again. To properly limit the maximum log file size, run the following PowerCLI command: # Add the setting to all VMs Get-VM | New-AdvancedSetting -Name 'log.rotateSize' -value '1024000'" reference : "800-53|AU-4,CIS_Recommendation|8.7.3,CSCv7|6.4,CSCv8|8.3,CSF|PR.DS-4,CSF|PR.PT-1,ITSG-33|AU-4,LEVEL|1A,NESA|T3.3.1,NESA|T3.6.2,QCSC-v1|8.2.1,QCSC-v1|13.2" see_also : "https://workbench.cisecurity.org/files/3473" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - log.rotateSize : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - log.rotateSize : " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - log.rotateSize : NOT found " xsl_stmt : "" xsl_stmt : "" xsl_stmt : " () - log.rotateSize : NOT found " xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" xsl_stmt : "" regex : "log\.rotateSize : " expect : "log\.rotateSize : 1024000$"