Appendix A Security Configuration Settings

This appendix captures the security configuration settings (Common Configuration Enumerations [CCEs]). The following table lists the VMware products and their associated security configurations.

CCE ID

Configuration(s)

Built-In / Enhanced

Product

Audit Procedure

Recommended Parameter Value

CCE-84401-9

NIST80053-VI-ESXi-CFG-00001

Enhanced

ESXi

Connect via SSH and run the following command:

# grep -i "^Ciphers" /etc/ssh/sshd_config

If there is no output or the output is not “Ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,aes192-cbc,aes256-cbc” or a subset of this list, ciphers that are not FIPS-approved are in use, so this is a finding.

aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,aes192-cbc,aes256-cbc

CCE-84402-7

NIST80053-VI-ESXi-CFG-00002

Enhanced

ESXi

Connect via SSH and run the following command:

# grep -i "^Protocol" /etc/ssh/sshd_config

If there is no output or the output is not exactly “Protocol 2”, this is a finding.

2

CCE-84403-5

NIST80053-VI-ESXi-CFG-00003

Enhanced

ESXi

Connect via SSH and run the following command:

# grep -i "^IgnoreRhosts" /etc/ssh/sshd_config

If there is no output or the output is not exactly “IgnoreRhosts yes”, this is a finding.

yes

CCE-84404-3

NIST80053-VI-ESXi-CFG-00004

Enhanced

ESXi

Connect via SSH and run the following command:

# grep -i "^HostbasedAuthentication" /etc/ssh/sshd_config

If there is no output or the output is not exactly “HostbasedAuthentication no”, this is a finding.

no

CCE-84405-0

NIST80053-VI-ESXi-CFG-00005

Enhanced

ESXi

Connect via SSH and run the following command:

# grep -i "^PermitRootLogin" /etc/ssh/sshd_config

If there is no output or the output is not exactly “PermitRootLogin no”, this is a finding.

no

CCE-84406-8

NIST80053-VI-ESXi-CFG-00006

Enhanced

ESXi

Connect via SSH and run the following command:

# grep -i "^PermitEmptyPasswords" /etc/ssh/sshd_config

If there is no output or the output is not exactly “PermitEmptyPasswords no”, this is a finding.

no

CCE-84407-6

NIST80053-VI-ESXi-CFG-00007

Enhanced

ESXi

Connect via SSH and run the following command:

# grep -i "^PermitUserEnvironment" /etc/ssh/sshd_config

If there is no output or the output is not exactly “PermitUserEnvironment no”, this is a finding.

no

CCE-84408-4

NIST80053-VI-ESXi-CFG-00008

Enhanced

ESXi

Connect via SSH and run the following command:

# grep -i "^MACs" /etc/ssh/sshd_config

If there is no output or the output is not exactly “MACs hmac-sha1,hmac-sha2-256,hmac-sha2-512”, this is a finding.

hmac-sha1,hmac-sha2-256,hmac-sha2-512

CCE-84409-2

NIST80053-VI-ESXi-CFG-00009

Enhanced

ESXi

Connect via SSH and run the following command:

# grep -i "^GSSAPIAuthentication" /etc/ssh/sshd_config

If there is no output or the output is not exactly “GSSAPIAuthentication no”, this is a finding.

no

CCE-84410-0

NIST80053-VI-ESXi-CFG-00010

Enhanced

ESXi

Connect via SSH and run the following command:

# grep -i "^KerberosAuthentication" /etc/ssh/sshd_config

If there is no output or the output is not exactly “KerberosAuthentication no”, this is a finding.

no

CCE-84411-8

NIST80053-VI-ESXi-CFG-00011

Enhanced

ESXi

Connect via SSH and run the following command:

# grep -i "^StrictModes" /etc/ssh/sshd_config

If there is no output or the output is not exactly “StrictModes yes”, this is a finding.

yes

CCE-84412-6

NIST80053-VI-ESXi-CFG-00012

Enhanced

ESXi

Connect via SSH and run the following command:

# grep -i "^Compression" /etc/ssh/sshd_config

If there is no output or the output is not exactly “Compression no”, this is a finding.

no

CCE-84413-4

NIST80053-VI-ESXi-CFG-00013

Enhanced

ESXi

Connect via SSH and run the following command:

# grep -i "^GatewayPorts" /etc/ssh/sshd_config

If there is no output or the output is not exactly “GatewayPorts no”, this is a finding.

no

CCE-84414-2

NIST80053-VI-ESXi-CFG-00014

Enhanced

ESXi

Connect via SSH and run the following command:

# grep -i "^X11Forwarding" /etc/ssh/sshd_config

If there is no output or the output is not exactly “X11Forwarding no”, this is a finding.

no

CCE-84415-9

NIST80053-VI-ESXi-CFG-00015

Enhanced

ESXi

Connect via SSH and run the following command:

# grep -i "^AcceptEnv" /etc/ssh/sshd_config

If there is no output or the output is not exactly “AcceptEnv”, this is a finding.

AcceptEnv

CCE-84416-7

NIST80053-VI-ESXi-CFG-00016

Enhanced

ESXi

Connect via SSH and run the following command:

# grep -i "^PermitTunnel" /etc/ssh/sshd_config

If there is no output or the output is not exactly “PermitTunnel no”, this is a finding.

no

CCE-84417-5

NIST80053-VI-ESXi-CFG-00017

Enhanced

ESXi

Connect via SSH and run the following command:

# grep -i "^ClientAliveCountMax" /etc/ssh/sshd_config

If there is no output or the output is not exactly “ClientAliveCountMax 3”, this is a finding.

3

CCE-84418-3

NIST80053-VI-ESXi-CFG-00018

Enhanced

ESXi

Connect via SSH and run the following command:

# grep -i "^ClientAliveInterval" /etc/ssh/sshd_config

If there is no output or the output is not exactly “ClientAliveInterval 200”, this is a finding.

200

CCE-84419-1

NIST80053-VI-ESXi-CFG-00019

Enhanced

ESXi

Connect via SSH and run the following command:

# grep -i "^MaxSessions" /etc/ssh/sshd_config

If there is no output or the output is not exactly “MaxSessions 1”, this is a finding.

1

CCE-84420-9

NIST80053-VI-ESXi-CFG-00020

Enhanced

ESXi

Connect via SSH and run the following command:

# grep -i "^Ciphers" /etc/ssh/sshd_config

If there is no output or the output is not exactly “Ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,aes192-cbc,aes256-cbc”, ciphers that are not FIPS-approved may be used, so this is a finding.

aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,aes192-cbc, aes256-cbc

CCE-84421-7

NIST80053-VI-ESXi-CFG-00022

Enhanced

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-AdvancedSetting -Name Security.PasswordQualityControl

If Security.PasswordQualityControl is not set to “similar=deny retry=3 min=disabled,disabled,disabled,disabled,15”, this is a finding.

similar=deny retry=3 min=disabled,disabled,disabled,disabled,15

CCE-84422-5

NIST80053-VI-ESXi-CFG-00028

Enhanced

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-VMHostFirewallException |
Where {$_.Name -eq 'SSH Server' -and $_.Enabled -eq $true} |
Select Name,Enabled,@{N="AllIPEnabled";E={$_.ExtensionData.AllowedHosts.AllIP}}

If for an enabled service “Allow connections from any IP address” is selected, this is a finding.

AllIPEnabled: False

CCE-84423-3

NIST80053-VI-ESXi-CFG-00030

Enhanced

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-AdvancedSetting -Name UserVars.SuppressShellWarning

If UserVars.SuppressShellWarning is not set to 0, this is a finding.

0

CCE-84424-1

NIST80053-VI-ESXi-CFG-00031

Enhanced

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Select Name,@{N="Lockdown";E={$_.Extensiondata.Config.LockdownMode}}

If Lockdown Mode is disabled, this is a finding.

For environments that do not use vCenter server to manage ESXi, this is not applicable.

lockdownNormal

CCE-84425-8

NIST80053-VI-ESXi-CFG-00034

Enhanced

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-AdvancedSetting -Name Security.AccountLockFailures

If Security.AccountLockFailures is not set to 3, this is a finding.

3

CCE-84426-6

NIST80053-VI-ESXi-CFG-00038

Enhanced

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-AdvancedSetting -Name UserVars.ESXiShellInteractiveTimeOut

If UserVars.ESXiShellInteractiveTimeOut is not set to 600, this is a finding.

600

CCE-84427-4

NIST80053-VI-ESXi-CFG-00039

Enhanced

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-AdvancedSetting -Name UserVars.ESXiShellTimeOut

If UserVars.ESXiShellTimeOut is not set to 600, this is a finding.

600

CCE-84428-2

NIST80053-VI-ESXi-CFG-00043

Enhanced

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-AdvancedSetting -Name Net.BlockGuestBPDU

If Net.BlockGuestBPDU is not set to 1, this is a finding.

1

CCE-84429-0

NIST80053-VI-ESXi-CFG-00056

Enhanced

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following commands:

$esxcli = Get-EsxCli
$esxcli.system.coredump.network.get()

If there is no active core dump partition or the network core dump collector is not configured and enabled, this is a finding.

TRUE

CCE-84430-8

NIST80053-VI-ESXi-CFG-00106

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHostFirewallDefaultPolicy

If the Incoming or Outgoing policies are True, this is a finding.

FALSE

CCE-84431-6

NIST80053-VI-ESXi-CFG-00107

Enhanced

ESXi

Log in to the host and run the following command:

# ls -la /etc/ssh/keys-root/authorized_keys

If the authorized_keys file exists, this is a finding.

File should not exist

CCE-84432-4

NIST80053-VI-ESXi-CFG-00108

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHostSnmp | Select \*

or

From a console or ssh session run the following command:

Esxcli system snmp get

If SNMP is not in use and is enabled, this is a finding.

If SNMP is enabled and “read only communities” is set to public, this is a finding.

If SNMP is enabled and is not using v3 targets, this is a finding.

Note: SNMP v3 targets can only be viewed and configured from the esxcli command.

FALSE

CCE-84433-2

NIST80053-VI-ESXi-CFG-00109

Enhanced

ESXi

Connect via SSH and run the following command:

# grep -i "^password" /etc/pam.d/passwd | grep sufficient

If the remember setting is not set or is not “remember=5”, this is a finding.

remember=5

CCE-84434-0

NIST80053-VI-ESXi-CFG-00110

Built-in

ESXi

Run the following command:

# grep -i "^password" /etc/pam.d/passwd | grep sufficient

If sha512 is not listed, this is a finding.

sha512

CCE-84435-7

NIST80053-VI-ESXi-CFG-00111

Enhanced

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-VMHostService | Where {$_.Label -eq "SSH"}

If the ESXi SSH service is running, this is a finding.

Policy: Off and Running: False

CCE-84436-5

NIST80053-VI-ESXi-CFG-00112

Enhanced

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-VMHostService | Where {$_.Label -eq "ESXi Shell"}

If the ESXi Shell service is running, this is a finding.

Policy: Off and Running: False

CCE-84437-3

NIST80053-VI-ESXi-CFG-00113

Enhanced

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-VMHostService | Where {$_.Label -eq "SSH"}

If the ESXi SSH service is running, this is a finding.

Policy: Off and Running: False

CCE-84438-1

NIST80053-VI-ESXi-CFG-00114

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-VMHostAuthentication

For systems that do not use Active Directory and have no local user accounts, other than root, dcui, and/or vpxuser, this is not applicable.

For systems that do not use Active Directory and do have local user accounts, other than root, dcui, and/or vpxuser, this is a finding.

If Directory Services Type is not set to “Active Directory”, this is a finding.

sfo01.rainpole.local

CCE-84439-9

NIST80053-VI-ESXi-CFG-00115

Built-in

ESXi

From a PowerCLI command prompt, while connected to vCenter run the following command:

Get-VMHost | Select Name, ` @{N="HostProfile";E={$_ |
Get-VMHostProfile}}, ` @{N="JoinADEnabled";E={($_ |
Get-VmHostProfile).ExtensionData.Config.ApplyProfile.Authentication.ActiveDirectory.Enabled}},
` @{N="JoinDomainMethod";E={(($_ |
Get-VMHostProfile).ExtensionData.Config.ApplyProfile.Authentication.ActiveDirectory |
Select -ExpandProperty Policy |
Where {$_.Id-eq "JoinDomainMethodPolicy"}).Policyoption.Id}}

Verify if "JoinADEnabled" is "True“ then "JoinDomainMethod" should be "FixedCAMConfigOption".

For systems that do not use Active Directory and have no local user accounts, other than root, dcui, and/or vpxuser, this is not applicable.

For systems that do not use Active Directory and do have local user accounts, other than root, dcui, and/or vpxuser, this is a finding.

If vSphere Authentication Proxy is not used to join hosts to an Active Directory domain, this is a finding.

JoinADEnabled: True, JoinDomainMethod: FixedCAMConfigOption

CCE-84440-7

NIST80053-VI-ESXi-CFG-00116

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-VMHostAuthentication

For systems that do not use Active Directory and have no local user accounts, other than root, dcui, and/or vpxuser, this is not applicable.

For systems that do not use Active Directory and do have local user accounts, other than root, dcui, and/or vpxuser, this is a finding.

If the Directory Services Type is not set to “Active Directory”, this is a finding.

sfo01.rainpole.local

CCE-84441-5

NIST80053-VI-ESXi-CFG-00117

Built-in

ESXi

From a PowerCLI command prompt, while connected to vCenter run the following command:

Get-VMHost | Select Name, ` @{N="HostProfile";E={$_ |
Get-VMHostProfile}}, ` @{N="JoinADEnabled";E={($_ |
Get-VmHostProfile).ExtensionData.Config.ApplyProfile.Authentication.ActiveDirectory.Enabled}},
` @{N="JoinDomainMethod";E={(($_ |
Get-VMHostProfile).ExtensionData.Config.ApplyProfile.Authentication.ActiveDirectory |
Select -ExpandProperty Policy |
Where {$_.Id -eq "JoinDomainMethodPolicy"}).Policyoption.Id}}

Verify if "JoinADEnabled" is "True“ then "JoinDomainMethod" should be "FixedCAMConfigOption".

For systems that do not use Active Directory and have no local user accounts, other than root, dcui, and/or vpxuser, this is not applicable.

For systems that do not use Active Directory and do have local user accounts, other than root, dcui, and/or vpxuser, this is a finding.

If vSphere Authentication Proxy is not used to join hosts to an Active Directory domain, this is a finding.

sfo01.rainpole.local

CCE-84442-3

NIST80053-VI-ESXi-CFG-00118

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-VMHostAuthentication

For systems that do not use Active Directory and have no local user accounts, other than root, dcui, and/or vpxuser, this is not applicable.

For systems that do not use Active Directory and do have local user accounts, other than root, dcui, and/or vpxuser, this is a finding.

If Directory Services Type is not set to “Active Directory”, this is a finding.

sfo01.rainpole.local

CCE-84443-1

NIST80053-VI-ESXi-CFG-00119

Built-in

ESXi

From a PowerCLI command prompt, while connected to vCenter run the following command:

Get-VMHost | Select Name, ` @{N="HostProfile";E={$_ |
Get-VMHostProfile}}, ` @{N="JoinADEnabled";E={($_ |
Get-VmHostProfile).ExtensionData.Config.ApplyProfile.Authentication.ActiveDirectory.Enabled}},
` @{N="JoinDomainMethod";E={(($_ |
Get-VMHostProfile).ExtensionData.Config.ApplyProfile.Authentication.ActiveDirectory |
Select -ExpandProperty Policy |
Where {$_.Id -eq "JoinDomainMethodPolicy"}).Policyoption.Id}}

Verify if "JoinADEnabled" is "True“ then "JoinDomainMethod" should be "FixedCAMConfigOption".

For systems that do not use Active Directory and have no local user accounts, other than root, dcui, and/or vpxuser, this is not applicable.

For systems that do not use Active Directory and do have local user accounts, other than root, dcui, and/or vpxuser, this is a finding.

If vSphere Authentication Proxy is not used to join hosts to an Active Directory domain, this is a finding.

sfo01.rainpole.local

CCE-84444-9

NIST80053-VI-ESXi-CFG-00120

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-VMHostAuthentication

For systems that do not use Active Directory and have no local user accounts, other than root, dcui, and/or vpxuser, this is not applicable.

For systems that do not use Active Directory and do have local user accounts, other than root, dcui, and/or vpxuser, this is a finding.

If Directory Services Type is not set to “Active Directory”, this is a finding.

sfo01.rainpole.local

CCE-84445-6

NIST80053-VI-ESXi-CFG-00121

Built-in

ESXi

From a PowerCLI command prompt, while connected to vCenter run the following command:

Get-VMHost | Select Name, ` @{N="HostProfile";E={$_ |
Get-VMHostProfile}}, ` @{N="JoinADEnabled";E={($_ |
Get-VmHostProfile).ExtensionData.Config.ApplyProfile.Authentication.ActiveDirectory.Enabled}},
` @{N="JoinDomainMethod";E={(($_ |
Get-VMHostProfile).ExtensionData.Config.ApplyProfile.Authentication.ActiveDirectory |
Select -ExpandProperty Policy |
Where {$_.Id -eq "JoinDomainMethodPolicy"}).Policyoption.Id}}

Verify if "JoinADEnabled" is "True“ then "JoinDomainMethod" should be "FixedCAMConfigOption".

For systems that do not use Active Directory and have no local user accounts, other than root, dcui, and/or vpxuser, this is not applicable.

For systems that do not use Active Directory and do have local user accounts, other than root, dcui, and/or vpxuser, this is a finding.

If vSphere Authentication Proxy is not used to join hosts to an Active Directory domain, this is a finding.

sfo01.rainpole.local

CCE-84446-4

NIST80053-VI-ESXi-CFG-00122

Enhanced

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-AdvancedSetting -Name Annotations.WelcomeMessage

Check for the login banner text (mentioned in the parameter value) based on the character limitations imposed by the system. An exact match of the text is required. If this banner is not displayed, this is a finding.

This system is for the use of authorized users only. Individuals using this computer system without authority or in excess of their authority are subject to having all their activities on this system monitored and recorded by system personnel. Anyone using this system expressly consents to such monitoring and is advised that if such monitoring reveals possible evidence of criminal activity, system personnel may provide the evidence of such monitoring to law enforcement officials.

CCE-84447-2

NIST80053-VI-ESXi-CFG-00123

Enhanced

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-AdvancedSetting -Name Config.Etc.issue

If the Config.Etc.issue setting (/etc/issue file) does not contain the logon banner exactly as shown in the parameter value, this is a finding.

This system is for the use of authorized users only. Individuals using this computer system without authority or in excess of their authority are subject to having all their activities on this system monitored and recorded by system personnel. Anyone using this system expressly consents to such monitoring and is advised that if such monitoring reveals possible evidence of criminal activity, system personnel may provide the evidence of such monitoring to law enforcement officials.

CCE-84448-0

NIST80053-VI-ESXi-CFG-00124

Enhanced

ESXi

Connect via SSH and run the following command:

# grep -i "^Banner" /etc/ssh/sshd_config

If there is no output or the output is not exactly “Banner /etc/issue”, this is a finding.

This system is for the use of authorized users only. Individuals using this computer system without authority or in excess of their authority are subject to having all their activities on this system monitored and recorded by system personnel. Anyone using this system expressly consents to such monitoring and is advised that if such monitoring reveals possible evidence of criminal activity, system personnel may provide the evidence of such monitoring to law enforcement officials.

CCE-84449-8

NIST80053-VI-ESXi-CFG-00125

Enhanced

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following script:

$vmhost = Get-VMHost | Get-View
$lockdown = Get-View $vmhost.ConfigManager.HostAccessManager
$lockdown.QueryLockdownExceptions()

If the exception users list contains accounts that do not require special permissions, this is a finding.

Note: This list is not intended for system administrator accounts but for special circumstances such as a service account.

Remove unnecessary users from the exception user list

CCE-84450-6

NIST80053-VI-ESXi-CFG-00127

Enhanced

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-AdvancedSetting -Name Annotations.WelcomeMessage

Check for the login banner text (mentioned in the parameter value) based on the character limitations imposed by the system. An exact match of the text is required. If this banner is not displayed, this is a finding.

This system is for the use of authorized users only. Individuals using this computer system without authority or in excess of their authority are subject to having all their activities on this system monitored and recorded by system personnel. Anyone using this system expressly consents to such monitoring and is advised that if such monitoring reveals possible evidence of criminal activity, system personnel may provide the evidence of such monitoring to law enforcement officials.

CCE-84451-4

NIST80053-VI-ESXi-CFG-00129

Enhanced

ESXi

If vCenter Update Manager is used on the network, it can scan all hosts for missing patches. From the vSphere Client, go to Hosts and Clusters >> Update Manager tab, and select Scan to view all hosts’ compliance status.

If vCenter Update Manager is not used, a host’s compliance status must be manually determined by the build number. VMware KB 1014508 can be used to correlate patches with build numbers.

If the ESXi host does not have the latest patches, this is a finding.

If the ESXi host is not on a supported release, this is a finding.

Apply latest patches and updates

CCE-84452-2

NIST80053-VI-ESXi-CFG-00134

Enhanced

ESXi

The downloaded ISO, offline bundle, or patch hash must be verified against the vendor’s checksum to ensure the integrity and authenticity of the files. See the typical command line example for the sha1 hash check:

# sha1sum <filename>.iso

If any of the system’s downloaded ISO, offline bundle, or system patch hashes cannot be verified against the vendor’s checksum, this is a finding.

Compare the SHA1 sum output with the value posted on the VMware Web site. They should match.

CCE-84453-0

NIST80053-VI-ESXi-CFG-00135

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-AdvancedSetting -Name Syslog.global.logHost

If Syslog.global.logHost is not set to a site-specific syslog server, this is a finding.

udp://sfo01vrli01.sfo01.rainpole.local:514

CCE-84454-8

NIST80053-VI-ESXi-CFG-00136

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-AdvancedSetting -Name Syslog.global.logDir

If LocalLogOutputIsPersistent is not set to true, this is a finding.

[] /scratch/log

CCE-84455-5

NIST80053-VI-ESXi-CFG-00137

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-AdvancedSetting -Name Config.HostAgent.plugins.hostsvc.esxAdminsGroup

For systems that do not use Active Directory and have no local user accounts, other than root, dcui, and/or vpxuser, this is not applicable.

For systems that do not use Active Directory and do have local user accounts, other than root, dcui, and/or vpxuser, this is a finding.

If Config.HostAgent.plugins.hostsvc.esxAdminsGroup is set to “ESX Admins”, this is a finding.

ug-SDDC-Admins

CCE-84456-3

NIST80053-VI-ESXi-CFG-00138

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-AdvancedSetting -Name Mem.ShareForceSalting

If Mem.ShareForceSalting is not set to 2, this is a finding.

2

CCE-84457-1

NIST80053-VI-ESXi-CFG-00139

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHostFirewallDefaultPolicy

If the Incoming or Outgoing policies are True, this is a finding.

N/A

CCE-84458-9

NIST80053-VI-ESXi-CFG-00141

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-AdvancedSetting -Name Syslog.global.logHost

If Syslog.global.logHost is not set to a site-specific syslog server, this is a finding.

udp://sfo01vrli01.sfo01.rainpole.local:514

CCE-84459-7

NIST80053-VI-ESXi-CFG-00142

Enhanced

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-AdvancedSetting -Name Config.HostAgent.plugins.hostsvc.esxAdminsGroup

For systems that do not use Active Directory and have no local user accounts, other than root, dcui, and/or vpxuser, this is not applicable.

For systems that do not use Active Directory and do have local user accounts, other than root, dcui, and/or vpxuser, this is a finding.

If Config.HostAgent.plugins.hostsvc.esxAdminsGroup is set to “ESX Admins”, this is a finding.

ug-SDDC-Admins

CCE-84460-5

NIST80053-VI-ESXi-CFG-00143

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-AdvancedSetting -Name Syslog.global.logHost

If Syslog.global.logHost is not set to a site-specific syslog server, this is a finding.

udp://sfo01vrli01.sfo01.rainpole.local:514

CCE-84461-3

NIST80053-VI-ESXi-CFG-00145

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-VMHostNTPServer
Get-VMHost | Get-VMHostService | Where {$_.Label -eq "NTP Daemon"}

If the NTP service is not configured with authoritative DoD time sources and the service is not configured to start and stop with the host and is running, this is a finding.

ntp.lax01.rainpole.local, ntp.sfo01.rainpole.local

CCE-84462-1

NIST80053-VI-ESXi-CFG-00157

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following commands:

$esxcli = Get-EsxCli
$esxcli.software.acceptance.get()

If the acceptance level is CommunitySupported, this is a finding.

PartnerSupported

CCE-84463-9

NIST80053-VI-ESXi-CFG-00158

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following commands:

$esxcli = Get-EsxCli
$esxcli.software.acceptance.get()

If the acceptance level is CommunitySupported, this is a finding.

PartnerSupported

CCE-84464-7

NIST80053-VI-ESXi-CFG-00159

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following commands:

$esxcli = Get-EsxCli
$esxcli.software.acceptance.get()

If the acceptance level is CommunitySupported, this is a finding.

PartnerSupported

CCE-84465-4

NIST80053-VI-ESXi-CFG-00160

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following commands:

$esxcli = Get-EsxCli
$esxcli.software.acceptance.get()

If the acceptance level is CommunitySupported, this is a finding.

PartnerSupported

CCE-84466-2

NIST80053-VI-ESXi-CFG-00161

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following commands:

Get-VDSwitch | Get-VDSecurityPolicy
Get-VDPortGroup | Get-VDSecurityPolicy

If Forged Transmits is set to accept, this is a finding.

FALSE

CCE-84467-0

NIST80053-VI-ESXi-CFG-00162

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following commands:

Get-VDSwitch | Get-VDSecurityPolicy
Get-VDPortGroup | Get-VDSecurityPolicy

If MAC Address Changes is set to accept, this is a finding.

FALSE

CCE-84468-8

NIST80053-VI-ESXi-CFG-00163

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-AdvancedSetting -Name DCUI.Access

If DCUI.Access is not restricted to root, this is a finding.

Note: This list is only for local user accounts and should only contain the root user.

root

CCE-84469-6

NIST80053-VI-ESXi-CFG-00164

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-AdvancedSetting -Name Syslog.global.logHost

If Syslog.global.logHost is not set to a site-specific syslog server, this is a finding.

udp://sfo01vrli01.sfo01.rainpole.local:514

CCE-84470-4

NIST80053-VI-ESXi-CFG-00165

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-AdvancedSetting -Name Security.AccountUnlockTime

If Security.AccountUnlockTime is not set to 900, this is a finding.

900

CCE-84471-2

NIST80053-VI-ESXi-CFG-00166

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-AdvancedSetting -Name Config.HostAgent.plugins.solo.enableMob

If Config.HostAgent.plugins.solo.enableMob is not set to false, this is a finding.

FALSE

CCE-84472-0

NIST80053-VI-ESXi-CFG-00167

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-AdvancedSetting -Name Config.HostAgent.plugins.hostsvc.esxAdminsGroup

For systems that do not use Active Directory and have no local user accounts, other than root, dcui, and/or vpxuser, this is not applicable.

For systems that do not use Active Directory and do have local user accounts, other than root, dcui, and/or vpxuser, this is a finding.

If Config.HostAgent.plugins.hostsvc.esxAdminsGroup is set to “ESX Admins”, this is a finding.

ug-SDDC-Admins

CCE-84473-8

NIST80053-VI-ESXi-CFG-00168

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-AdvancedSetting -Name UserVars.DcuiTimeOut

If UserVars.DcuiTimeOut is not set to 600, this is a finding.

600

CCE-84474-6

NIST80053-VI-ESXi-CFG-00169

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-AdvancedSetting -Name Net.DVFilterBindIpAddress

If Net.DVFilterBindIpAddress is not blank and security appliances are not in use on the host, this is a finding.

“”

CCE-84475-3

NIST80053-VI-ESXi-CFG-00170

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-AdvancedSetting -Name Syslog.global.logHost

If Syslog.global.logHost is not set to a site-specific syslog server, this is a finding.

udp://sfo01vrli01.sfo01.rainpole.local:514

CCE-84476-1

NIST80053-VI-ESXi-CFG-00171

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-AdvancedSetting -Name UserVars.DcuiTimeOut

If UserVars.DcuiTimeOut is not set to 600, this is a finding.

600

CCE-84477-9

NIST80053-VI-ESXi-CFG-00172

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-AdvancedSetting -Name Syslog.global.logHost

If Syslog.global.logHost is not set to a site-specific syslog server, this is a finding.

udp://sfo01vrli01.sfo01.rainpole.local:514

CCE-84478-7

NIST80053-VI-ESXi-CFG-00173

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-AdvancedSetting -Name Config.HostAgent.plugins.hostsvc.esxAdminsGroup

For systems that do not use Active Directory and have no local user accounts, other than root, dcui, and/or vpxuser, this is not applicable.

For systems that do not use Active Directory and do have local user accounts, other than root, dcui, and/or vpxuser, this is a finding.

If the Config.HostAgent.plugins.hostsvc.esxAdminsGroup keyword is set to “ESX Admins”, this is a finding.

ug-SDDC-Admins

CCE-84479-5

NIST80053-VI-ESXi-CFG-00174

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-AdvancedSetting -Name Syslog.global.logHost

If Syslog.global.logHost is not set to a site-specific syslog server, this is a finding.

udp://sfo01vrli01.sfo01.rainpole.local:514

CCE-84480-3

NIST80053-VI-ESXi-CFG-00175

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-AdvancedSetting -Name Config.HostAgent.plugins.hostsvc.esxAdminsGroup

For systems that do not use Active Directory and have no local user accounts, other than root, dcui, and/or vpxuser, this is not applicable.

For systems that do not use Active Directory and do have local user accounts, other than root, dcui, and/or vpxuser, this is a finding.

If Config.HostAgent.plugins.hostsvc.esxAdminsGroup is set to “ESX Admins”, this is a finding.

ug-SDDC-Admins

CCE-84481-1

NIST80053-VI-ESXi-CFG-00176

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-AdvancedSetting -Name Syslog.global.logHost

If Syslog.global.logHost is not set to a site-specific syslog server, this is a finding.

udp://sfo01vrli01.sfo01.rainpole.local:514

CCE-84482-9

NIST80053-VI-ESXi-CFG-00177

Built-in

ESXi

The vMotion VMkernel port group should be in a dedicated VLAN that can be on a common standard or distributed virtual switch as long as the vMotion VLAN is not shared by any other function and it is not routed to anything but ESXi hosts. The check for this will be unique per environment.

From the vSphere Client, select the ESXi host and go to Configure > Networking > VMKernel adapters. Review the VLANs associated with the vMotion VMkernel(s) and verify they are dedicated for that purpose and logically separated from other functions.

If long distance or cross vCenter vMotion is used, the vMotion network can be routable but must be accessible to only the intended ESXi hosts.

If the vMotion port group is not on an isolated VLAN and/or is routable to systems other than ESXi hosts, this is a finding.

For environments that do not use vCenter Server to manage ESXi, this is not applicable.

vMotion VMKernel Port group should be in a dedicated VLAN. The check for this will Be unique per environment.

CCE-84483-7

NIST80053-VI-ESXi-CFG-00178

Built-in

ESXi

The Management VMkernel port group should be in a dedicated VLAN that can be on a common standard or distributed virtual switch as long as the Management VLAN is not shared by any other function and it is not routed to anything other than management related functions such as vCenter. The check for this will be unique per environment.

From the vSphere Client, select the ESXi host and go to Configure > Networking > VMKernel adapters. Review the VLANs associated with the Management VMkernel and verify they are dedicated for that purpose and logically separated from other functions.

If the network segment is routed, except to networks where other management-related entities are located such as vCenter, this is a finding.

If production virtual machine traffic is routed to this network, this is a finding.

Management VMKernel Port group should be in a dedicated VLAN. The check for this will be unique per environment

CCE-84484-5

NIST80053-VI-ESXi-CFG-00179

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-AdvancedSetting -Name Config.HostAgent.log.level

If Config.HostAgent.log.level is not set to info, this is a finding.

Note: Verbose logging level is acceptable for troubleshooting purposes.

info

CCE-84485-2

NIST80053-VI-ESXi-CFG-00180

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-AdvancedSetting -Name Config.HostAgent.log.level

If Config.HostAgent.log.level is not set to info, this is a finding.

Note: Verbose logging level is acceptable for troubleshooting purposes.

info

CCE-84486-0

NIST80053-VI-ESXi-CFG-00181

Built-in

ESXi

From the vSphere Client, select the ESXi Host and go to Configure >> Networking >> VMKernel adapters. Review each VMkernel adapter that is defined and ensure it is enabled for only one type of management traffic.

If any VMkernel is used for more than one type of management traffic, this is a finding.

N/A

CCE-84487-8

NIST80053-VI-ESXi-CFG-00182

Built-in

ESXi

From the vSphere Client, select the ESXi Host and go to Configure >> Networking >> TCP/IP Configuration. Review the default system TCP/IP stacks and verify they are configured with the appropriate IP address information.

If any system TCP/IP stack is configured and not in use by a VMkernel adapter, this is a finding.

N/A

CCE-84488-6

NIST80053-VI-ESXi-CFG-00192

Built-in

ESXi

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-VMHostNTPServer
Get-VMHost | Get-VMHostService | Where {$_.Label -eq "NTP Daemon"}

If the NTP service is not configured with authoritative DoD time sources and the service is not configured to start and stop with the host and is running, this is a finding.

Policy: On and Running: True

CCE-84489-4

NIST80053-VI-ESXi-CFG-00184

Built-in

ESXi

This check refers to an entity outside the physical scope of the ESXi server system. The configuration of upstream physical switches must be documented to ensure that spanning tree protocol is disabled and/or portfast is configured for all physical ports connected to ESXi hosts. Inspect the documentation and verify that the documentation is updated on a regular basis and/or whenever modifications are made to either ESXi hosts or the upstream physical switches. Alternatively, log in to the physical switch and verify that spanning tree protocol is disabled and/or portfast is configured for all physical ports connected to ESXi hosts.

If the physical switch’s spanning tree protocol is not disabled or portfast is not configured for all physical ports connected to ESXi hosts, this is a finding.

N/A

CCE-84501-6

NIST80053-VI-NET-CFG-00251

Built-in

NSX

From the vSphere Web Client, go to Administration >> Single Sign-On >> Policies >> Password Policy.

NSX Manager Appliance - NSX Domain Service Account - Password (Dependent on Customer Configurations)

CCE-84502-4

NIST80053-VI-NET-CFG-00252

Built-in

NSX

From the vSphere Web Client, go to Administration >> Single Sign-On >> Policies >> Password Policy.

Border Gateway Protocol Password (Dependent on Customer Configurations)

CCE-84503-2

NIST80053-VI-NET-CFG-00253

Built-in

NSX

From the vSphere Web Client, go to Administration >> Single Sign-On >> Policies >> Password Policy.

Universal Distributed Logical Router Password (Dependent on Customer Configurations)

CCE-84504-0

NIST80053-VI-NET-CFG-00281

Built-in

NSX

Log on to NSX Manager Virtual Appliance, then go to Backup & Restore.

If “Audit Logs” or “System Events” are excluded (by default they are NOT excluded), this is a finding.

Audit Logs and System Events are not excluded

CCE-84505-7

NIST80053-VI-NET-CFG-00282

Built-in

NSX

Log on to NSX Manager Virtual Appliance, then go to Manage Appliance Settings and look under General Network Settings.

If IPv6 is configured, this is a finding.

IPv6 should be disabled

CCE-84506-5

NIST80053-VI-NET-CFG-00283

Built-in

NSX

Log on to NSX Manager Virtual Appliance, then go to Manage Appliance Settings and look under DNS Servers.

If IPv6 DNS is configured, this is a finding.

IPv6 DNS should be disabled

CCE-84507-3

NIST80053-VI-NET-CFG-00285

Built-in

NSX

Log on to NSX Manager Virtual Appliance, then go to Manage Appliance Settings and look under Time Settings.

If any of the NTP Servers are not authorized or trusted, this is a finding.

  1. Use at least three NTP servers from outside time sources

-OR-

  1. Configure a few local NTP servers on a trusted network that in turn obtain their time from at least three outside time sources

CCE-84508-1

NIST80053-VI-NET-CFG-00286

Built-in

NSX

Log on to NSX Manager Virtual Appliance and go to Manage Appliance Settings. Verify syslog server configuration.

Remote syslog server is configured

CCE-84509-9

NIST80053-VI-NET-CFG-00287

Built-in

NSX

Log on to NSX Manager Virtual Appliance, then go to Manage Appliance Settings –> SSL Certificates. Click on the certificate and verify certificate details.

  1. Appropriate issuer

  2. Correct certificate type

  3. RSA algorithm

  4. 2048-bit keys or higher

CCE-84510-7

NIST80053-VI-NET-CFG-00288

Built-in

NSX

Access the deployment and try to reach NSX Manager on the standard network. NSX Manager should only be reachable using isolation mechanisms.

Procedural

CCE-84511-5

NIST80053-VI-NET-CFG-00289

Built-in

NSX

Log in to the VMware vSphere environment and inspect which users have access permissions to NSX Manager Virtual Appliance.

If any user other than the intended administrator has access or is able to carry out any administrative actions, this is a finding.

Procedural

CCE-84512-3

NIST80053-VI-NET-CFG-00290

Built-in

NSX

Log in to the SFTP server and navigate to the backup directory.

If the backup directory can be read from or written to by users other than the backup user, this is a finding.

No read or write permissions on backup directory

CCE-84513-1

NIST80053-VI-NET-CFG-00291

Built-in

NSX

Log on to NSX Manager Virtual Appliance, then go to Manage Appliance Settings and look under General network settings.

If IPv4 DNS is not authorized or secure, this is a finding.

IPv4 DNS is authorized and secure

CCE-84514-9

NIST80053-VI-NET-CFG-00294

Built-in

NSX

Log on to NSX Manager Virtual Appliance, then look under Backup & Restore. Verify “FTP Server settings”.

FTP Server settings (Dependent on Customer Configurations)

CCE-84515-6

NIST80053-VI-NET-CFG-00295

Built-in

NSX

After downloading the media, use the SHA1 sum value to verify the integrity of the download. Compare the SHA1 hash output with the value posted on the VMware secure website.

If the hash output does not match the website value, this is a finding.

SHA1 hash should match

CCE-84516-4

NIST80053-VI-NET-CFG-00296

Built-in

NSX

If the controller network is not deployed on a network that is not configured for or connected to other types of traffic, this is a finding.

Procedural (Dependent on Customer Configurations)

CCE-84517-2

NIST80053-VI-NET-CFG-00297

Built-in

NSX

Run this REST API call to get the properties of the controller node:

https://<nsxmgr>/api/2.0/vdn/controller/node

Response:

<controllerNodeConfig>
<ipSecEnabled>true</ipSecEnabled>
</controllerNodeConfig>

If ipSecEnabled is not true, this is a finding.

<ipSecEnabled>true</ipSecEnabled >

CCE-84518-0

NIST80053-VI-NET-CFG-00300

Built-in

NSX

Thoroughly review the deployment.

If the virtual network is not isolated, this is a finding.

Procedural (Dependent on Customer Configurations)

CCE-84519-8

NIST80053-VI-NET-CFG-00301

Built-in

NSX

Do a thorough check on the infrastructure design and deployment network diagram.

If there are any non-hypervisors on the logical network data plane or if any untrusted hypervisors are used, this is a finding.

Procedural (Dependent on Customer Configurations)

CCE-84520-6

NIST80053-VI-NET-CFG-00302

Built-in

NSX

Use the vSphere Web Client to connect to the vCenter Server. As administrator, go to Home > Inventory > Networking. Select “DSwitch” for distributed portgroups. Select each dvPortgroup connected to active VMs requiring securing. Go to tab Summary > Edit Settings > Policies > Security.

If Forged Transmits is not set to Reject, this is a finding.

Reject

CCE-84521-4

NIST80053-VI-NET-CFG-00303

Built-in

NSX

Use the vSphere Web Client to connect to the vCenter Server. As administrator, go to Home > Inventory > Networking. Select “DSwitch” for distributed portgroups. Select each dvPortgroup connected to active VMs requiring securing. Go to tab Summary > Edit Settings > Policies > Security.

If Mac Address Changes is not set to Reject, this is a finding.

Reject

CCE-84522-2

NIST80053-VI-NET-CFG-00304

Built-in

NSX

Use the vSphere Web Client to connect to the vCenter Server. As administrator, go to Home > Inventory > Networking. Select “DSwitch” for distributed portgroups. Select each dvPortgroup connected to active VMs requiring securing. Go to tab Summary > Edit Settings > Policies > Security.

If Promiscuous Mode is not set to Reject, this is a finding.

Reject

CCE-84523-0

NIST80053-VI-NET-CFG-00306

Built-in

NSX

Log in to VMware vSphere Web Client. Navigate to Networking and Security –> Installation and Upgrade. Go to the “Host Preparation” tab. Under the “VXLAN” column, select “View Configuration”.

If VMKNic Teaming Policy is not set to “Load Balance - SRCID”, this is a finding.

Load Balance - SRCID

CCE-84524-8

NIST80053-VI-NET-CFG-00308

Built-in

NSX

Log into the vCenter web interface with credentials authorized for administration. Navigate to Networking and Security >> Firewall. Expand “Default Section Layer 3” in Configuration.

If the action for the Default Rule is “Allow”, this is a finding.

Denied

CCE-84525-5

NIST80053-VI-NET-CFG-00311

Built-in

NSX

Log on to vSphere Web Client with credentials authorized for administration. Navigate and select Networking and Security >> Users and Domains.

View each role and verify the users and/or groups assigned to it.

Procedural

CCE-84526-3

NIST80053-VI-NET-CFG-00312

Built-in

NSX

From the vSphere Web Client, go to Administration >> Single Sign-On >> Configuration >> Policies >> Password Policy. View the values of the password format requirements.

If Numeric Characters is not set to at least 1, this is a finding.

1

CCE-84527-1

NIST80053-VI-NET-CFG-00313

Built-in

NSX

From the vSphere Web Client, go to Administration >> Single Sign-On >> Configuration >> Policies >> Password Policy. View the values of the password format requirements.

If Special Characters is not set to at least 1, this is a finding.

1

CCE-84528-9

NIST80053-VI-NET-CFG-00316

Built-in

NSX

Log on to vSphere Web Client with credentials authorized for administration. Navigate and select Networking and Security >> Users and Domains. View each role and verify the users and/or groups assigned to it.

If any user or service account has more privileges than required, this is a finding.

Procedural

CCE-84529-7

NIST80053-VI-NET-CFG-00317

Built-in

NSX

Log into NSX Manager with built-in administrator account “admin” and default manufacturer password “default”.

If the NSX Manager accepts the default password, this is a finding.

Non-default password

CCE-84530-5

NIST80053-VI-NET-CFG-00318

Built-in

NSX

Log into vSphere Web Client with credentials authorized for administration. Navigate to Networking and Security >> Firewall. Expand rule sections as necessary to view rules.

If there are no rules configured to enforce authorizations, this is a finding.

Procedural

CCE-84531-3

NIST80053-VI-NET-CFG-00321

Built-in

NSX

From the vSphere Web Client, go to Administration >> Single Sign-On >> Configuration >> Policies >> Password Policy. View the values of the password format requirements.

If Lower-Case Characters is not set to at least 1, this is a finding.

1

CCE-84532-1

NIST80053-VI-NET-CFG-00322

Built-in

NSX

From the vSphere Web Client, go to Administration >> Single Sign-On >> Configuration >> Policies >> Password Policy.

If Upper-Case Characters is not set to at least 1, this is a finding.

1

CCE-84533-9

NIST80053-VI-NET-CFG-00323

Enhanced

NSX

Log into vSphere Web Client with credentials authorized for administration. Navigate and select Networking and Security >> Firewall tab to display a list of firewall rules deployed across the NSX environment. Click on the dropdown arrow to expand each firewall rule’s section. For each rule, select the pencil icon in the “Action” column.

If the “Log” option has not been enabled for all rules, this is a finding.

Log

CCE-84534-7

NIST80053-VI-NET-CFG-00324

Enhanced

NSX

Log into vSphere Web Client with credentials authorized for administration. Navigate and select Networking and Security >> SpoofGuard. Check the Default policy of each NSX Manager.

If the mode is disabled, this is a finding.

Enabled

CCE-84535-4

NIST80053-VI-NET-CFG-00328

Built-in

NSX

Log onto vSphere Web Client with credentials authorized for administration. Navigate and select Networking and Security >> and select the NSX Edges tab on the left-side menu. Double-click the Edge ID. Navigate to Manage >> Verify the configurations under Settings, Firewall, Routing, Bridging, and DHCP Relay are enabled only as necessary for the deployment.

If unnecessary services are enabled, this is a finding.

Enabled

CCE-84536-2

NIST80053-VI-NET-CFG-00329

Built-in

NSX

If the built-in SSO administrator account is used for daily operations or there is no policy restricting its use, this is a finding.

Procedural (Dependent on Customer Configurations)

CCE-84537-0

NIST80053-VI-NET-CFG-00330

Built-in

NSX

From the vSphere Web Client, go to Administration >> Single Sign-On >> Configuration >> Policies >> Password Policy.

If Restrict Reuse is not set to “5” or more, this is a finding.

5

CCE-84538-8

NIST80053-VI-NET-CFG-00340

Built-in

NSX

Go to the vSphere Web Client URL https://client-hostname/vsphere-client and verify the CA certificate is signed by an approved service provider.

If a public key certificate from an appropriate certificate policy through an approved service provider is not used, this is a finding.

Procedural

CCE-84539-6

NIST80053-VI-NET-CFG-00343

Built-in

NSX

Log into vSphere Web Client with credentials authorized for administration. Navigate and select Networking and Security >> Firewall.

If there are services enabled that should not be, this is a finding.

Procedural

CCE-84540-4

NIST80053-VI-NET-CFG-00344

Built-in

NSX

Log into vSphere Web Client with credentials authorized for administration. Navigate and select Networking and Security >> Firewall.

If ports, protocols, and/or services are not disabled or restricted as required by the PPSM, this is a finding.

Procedural

CCE-84541-2

NIST80053-VI-NET-CFG-00360

Built-in

NSX

Log onto vSphere Web Client with credentials authorized for administration. Navigate and select Networking and Security >> and select the NSX Edges tab on the left-side menu. Double-click the EdgeID. Click on the Configure tab on the top of the new screen, then Interfaces. Check the “Connection Status” column for the associated interface.

If any inactive router interfaces are not disabled, this is a finding.

Procedural

CCE-84542-0

NIST80053-VI-NET-CFG-00372

Built-in

NSX

Log on to NSX Manager with credentials authorized for administration. Navigate and select Backup and Restore >> Backup History.

If backups are not being sent to a centralized location when changes occur or weekly, whichever is sooner, this is a finding.

Procedural

CCE-84301-1

NIST80053-VI-VC-CFG-00060

Enhanced

vCenter

Ask the system administrator if hardened, patched templates are used for VM creation with properly configured OS deployments, including applications both dependent and non-dependent on VM-specific configurations.

If hardened, patched templates are not used for VM creation, this is a finding. The system must use templates to deploy VMs whenever possible.

Hardened virtual machine templates to use for OS deployments

CCE-84302-9

NIST80053-VI-ESXI-CFG-00061

Enhanced

vCenter

On the Home page of the vSphere Client, select Menu > Administration and click Roles. Select the VC from the Roles provider drop-down menu. Select the Virtual machine user (sample) role and click Privileges.

If the Console Interaction privilege is assigned to the role, this is a finding. If SSH and/or terminal management services are exclusively used to perform management tasks, this is not a finding.

Disable Console Interaction privilege

CCE-84303-7

NIST80053-VI-ESXI-CFG-00065

Built-in

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM | Where {$_.ExtensionData.Config.Hardware.Device.DeviceInfo.Label -match ""parallel""}

If a virtual machine has a parallel device present, this is a finding.

Disconnect unauthorized parallel devices

CCE-84304-5

NIST80053-VI-ESXI-CFG-00066

Built-in

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM | Where {$_.ExtensionData.Config.Hardware.Device.DeviceInfo.Label -match ""serial""}

If a virtual machine has a serial device present, this is a finding.

Disconnect unauthorized serial devices

CCE-84305-2

NIST80053-VI-ESXI-CFG-00067

Built-in

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM | Get-UsbDevice

If a virtual machine has any USB devices or USB controllers present, this is a finding.

No USB device present

CCE-84306-0

NIST80053-VI-ESXI-CFG-00068

Built-in

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name sched.mem.pshare.salt

If sched.mem.pshare.salt exists, this is a finding.

Remove the advanced setting sched.mem.pshare.salt

CCE-84307-8

NIST80053-VI-ESXI-CFG-00070

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name isolation.tools.copy.disable

If isolation.tools.copy.disable does not exist or is not set to true, this is a finding.

TRUE

CCE-84308-6

NIST80053-VI-ESXI-CFG-00071

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name isolation.tools.dnd.disable

If isolation.tools.dnd.disable does not exist or is not set to true, this is a finding.

TRUE

CCE-84309-4

NIST80053-VI-ESXI-CFG-00072

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name isolation.tools.setGUIOptions.enable

If isolation.tools.setGUIOptions.enable does not exist or is not set to false, this is a finding.

FALSE

CCE-84310-2

NIST80053-VI-ESXI-CFG-00073

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name isolation.tools.paste.disable

If isolation.tools.paste.disable does not exist or is not set to true, this is a finding.

TRUE

CCE-84311-0

NIST80053-VI-ESXI-CFG-00074

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name isolation.tools.diskShrink.disable

If isolation.tools.diskShrink.disable does not exist or is not set to true, this is a finding.

TRUE

CCE-84312-8

NIST80053-VI-ESXI-CFG-00075

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name isolation.tools.diskWiper.disable

If isolation.tools.diskWiper.disable does not exist or is not set to true, this is a finding.

TRUE

CCE-84313-6

NIST80053-VI-ESXI-CFG-00076

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name isolation.tools.hgfsServerSet.disable

If isolation.tools.hgfsServerSet.disable does not exist or is not set to true, this is a finding.

TRUE

CCE-84314-4

NIST80053-VI-ESXI-CFG-00077

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name isolation.tools.ghi.autologon.disable

If isolation.tools.ghi.autologon.disable does not exist or is not set to true, this is a finding.

TRUE

CCE-84315-1

NIST80053-VI-ESXI-CFG-00078

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name isolation.bios.bbs.disable

If isolation.bios.bbs.disable does not exist or is not set to true, this is a finding.

TRUE

CCE-84316-9

NIST80053-VI-ESXI-CFG-00079

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name isolation.tools.getCreds.disable

If isolation.tools.getCreds.disable does not exist or is not set to true, this is a finding.

TRUE

CCE-84317-7

NIST80053-VI-ESXI-CFG-00080

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name isolation.tools.ghi.launchmenu.change

If isolation.tools.ghi.launchmenu.change does not exist or is not set to true, this is a finding.

TRUE

CCE-84318-5

NIST80053-VI-ESXI-CFG-00081

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name isolation.tools.memSchedFakeSampleStats.disable

If isolation.tools.memSchedFakeSampleStats.disable does not exist or is not set to true, this is a finding.

TRUE

CCE-84319-3

NIST80053-VI-ESXI-CFG-00082

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name isolation.tools.ghi.protocolhandler.info.disable

If isolation.tools.ghi.protocolhandler.info.disable does not exist or is not set to true, this is a finding.

TRUE

CCE-84320-1

NIST80053-VI-ESXI-CFG-00083

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name isolation.ghi.host.shellAction.disable

If isolation.ghi.host.shellAction.disable does not exist or is not set to true, this is a finding.

TRUE

CCE-84321-9

NIST80053-VI-ESXI-CFG-00084

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name isolation.tools.dispTopoRequest.disable

If isolation.tools.dispTopoRequest.disable does not exist or is not set to true, this is a finding.

TRUE

CCE-84322-7

NIST80053-VI-ESXI-CFG-00085

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name isolation.tools.trashFolderState.disable

If isolation.tools.trashFolderState.disable does not exist or is not set to true, this is a finding.

TRUE

CCE-84323-5

NIST80053-VI-ESXI-CFG-00086

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name isolation.tools.ghi.trayicon.disable

If isolation.tools.ghi.trayicon.disable does not exist or is not set to true, this is a finding.

TRUE

CCE-84324-3

NIST80053-VI-ESXI-CFG-00087

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name isolation.tools.unity.disable

If isolation.tools.unity.disable does not exist or is not set to true, this is a finding.

TRUE

CCE-84325-0

NIST80053-VI-ESXI-CFG-00088

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name isolation.tools.unityInterlockOperation.disable

If isolation.tools.unityInterlockOperation.disable does not exist or is not set to true, this is a finding.

TRUE

CCE-84326-8

NIST80053-VI-ESXI-CFG-00089

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name isolation.tools.unity.push.update.disable

If isolation.tools.unity.push.update.disable does not exist or is not set to true, this is a finding.

TRUE

CCE-84327-6

NIST80053-VI-ESXI-CFG-00090

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name isolation.tools.unity.taskbar.disable

If isolation.tools.unity.taskbar.disable does not exist or is not set to true, this is a finding.

TRUE

CCE-84328-4

NIST80053-VI-ESXI-CFG-00091

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name isolation.tools.unityActive.disable

If isolation.tools.unityActive.disable does not exist or is not set to true, this is a finding.

TRUE

CCE-84329-2

NIST80053-VI-ESXI-CFG-00092

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name isolation.tools.unity.windowContents.disable

If isolation.tools.unity.windowContents.disable does not exist or is not set to true, this is a finding.

TRUE

CCE-84330-0

NIST80053-VI-ESXI-CFG-00093

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name isolation.tools.vmxDnDVersionGet.disable

If isolation.tools.vmxDnDVersionGet.disable does not exist or is not set to true, this is a finding.

TRUE

CCE-84331-8

NIST80053-VI-ESXI-CFG-00094

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name isolation.tools.guestDnDVersionSet.disable

If isolation.tools.guestDnDVersionSet.disable does not exist or is not set to true, this is a finding.

TRUE

CCE-84332-6

NIST80053-VI-ESXI-CFG-00095

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name isolation.tools.vixMessage.disable

If isolation.tools.vixMessage.disable does not exist or is not set to true, this is a finding.

TRUE

CCE-84333-4

NIST80053-VI-ESXI-CFG-00096

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name RemoteDisplay.maxConnections

If RemoteDisplay.maxConnections does not exist or is not set to 1, this is a finding.

1

CCE-84334-2

NIST80053-VI-ESXI-CFG-00097

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name RemoteDisplay.vnc.enabled

If RemoteDisplay.vnc.enabled does not exist or is not set to false, this is a finding.

FALSE

CCE-84335-9

NIST80053-VI-ESXI-CFG-00098

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name isolation.tools.autoInstall.disable

If isolation.tools.autoInstall.disable does not exist or is not set to true, this is a finding.

TRUE

CCE-84336-7

NIST80053-VI-ESXI-CFG-00099

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name tools.setinfo.sizeLimit

If tools.setinfo.sizeLimit does not exist or is not set to 1048576, this is a finding.

1048576

CCE-84337-5

NIST80053-VI-ESXI-CFG-00100

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name isolation.device.edit.disable

If isolation.device.edit.disable does not exist or is not set to true, this is a finding.

TRUE

CCE-84338-3

NIST80053-VI-ESXI-CFG-00101

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name isolation.device.connectable.disable

If isolation.device.connectable.disable does not exist or is not set to true, this is a finding.

TRUE

CCE-84339-1

NIST80053-VI-ESXI-CFG-00102

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name tools.guestlib.enableHostInfo

If tools.guestlib.enableHostInfo does not exist or is not set to false, this is a finding.

FALSE

CCE-84340-9

NIST80053-VI-ESXI-CFG-00154

Built-in

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-HardDisk | Select Parent, Name, Filename, DiskType, Persistence | FT -AutoSize

If the virtual machine has attached disks that are in independent nonpersistent mode, this is a finding.

Persistent

CCE-84341-7

NIST80053-VI-ESXI-CFG-00155

Built-in

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM | Get-FloppyDrive | Select Parent, Name, ConnectionState

If a virtual machine has a floppy drive present, this is a finding.

Disconnect unauthorized floppy devices

CCE-84342-5

NIST80053-VI-ESXI-CFG-00156

Built-in

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM | Get-CDDrive | Where {$_.extensiondata.connectable.connected -eq $true} | Select Parent,Name

If a virtual machine has a CD/DVD drive connected other than temporarily, this is a finding.

Disconnect unauthorized CD/DVD drives

CCE-84343-3

NIST80053-VI-ESXI-CFG-00185

Built-in

vCenter

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VirtualPortGroup | Select Name, VLanID

If any port group is configured with VLAN 4095 and is not documented as a needed exception, this is a finding.

Not 4095

CCE-84344-1

NIST80053-VI-NET-CFG-00341

Built-in

vCenter

If the vCenter server is not joined to an Active Directory domain and not configured for Single Sign-On Identity Source of the Active Directory domain, and Active Directory/CAC/PIV certificate-based accounts are not used for daily operations of the vCenter server, this is a finding.

Procedural (Dependent on Customer Configurations)

CCE-84345-8

NIST80053-VI-NET-CFG-00341

Built-in

vCenter

If the vCenter server is not joined to an Active Directory domain and not configured for Single Sign-On Identity Source of the Active Directory domain, and Active Directory/CAC/PIV certificate-based accounts are not used for daily operations of the vCenter server, this is a finding.

Procedural (Dependent on Customer Configurations)

CCE-84347-4

NIST80053-VI-VC-CFG-00402

Built-in

vCenter

From a PowerCLI command prompt, while connected to the vCenter server run the following command:

Get-VDPortgroup | select Name, VlanConfiguration

If any port group is configured with VLAN 4095 and is not documented as a needed exception, this is a finding.

Not 4095

CCE-84348-2

NIST80053-VI-VC-CFG-00403

Built-in

vCenter

From the vSphere Web Client go to Administration >> Single Sign-On >> Configuration >> Policies >> Password Policy.

If Restrict Reuse is not set to 5 or more, this is a finding.

5

CCE-84349-0

NIST80053-VI-VC-CFG-00404

Built-in

vCenter

From a PowerCLI command prompt, while connected to the vCenter server run the following command:

Get-AdvancedSetting -Entity <vcenter server name> -Name config.log.level

If the level is not set to info, this is a finding.

info

CCE-84350-8

NIST80053-VI-VC-CFG-00405

Built-in

vCenter

From a PowerCLI command prompt, while connected to the vCenter server run the following commands:

Get-VDSwitch | Get-VDSecurityPolicy
Get-VDPortgroup | Get-VDSecurityPolicy

If the Promiscuous Mode policy is set to accept, this is a finding.

reject

CCE-84351-6

NIST80053-VI-VC-CFG-00406

Built-in

vCenter

From the vSphere Web Client go to Administration >> Client Plug-Ins. View the Installed/Available Plug-ins list and verify they are all identified as authorized VMware, 3rd party (Partner), and/or site-specific (locally developed and site) approved plug-ins.

If any Installed/Available plug-ins in the viewable list cannot be verified as vSphere Client plug-ins and/or authorized extensions from trusted sources, this is a finding.

Authorized extensions from Trusted Sources

CCE-84352-4

NIST80053-VI-VC-CFG-00407

Built-in

vCenter

From a PowerCLI command prompt, while connected to the vCenter server run the following commands:

Get-VDSwitch | Get-VDSecurityPolicy
Get-VDPortgroup | Get-VDSecurityPolicy

If the MAC Address Changes policy is set to accept, this is a finding.

reject

CCE-84353-2

NIST80053-VI-VC-CFG-00408

Built-in

vCenter

From the vSphere Web Client go to Administration >> Single Sign-On >> Configuration >> Policies >> Password Policy.

If Upper-Case Characters is not set to at least 1, this is a finding.

1

CCE-84354-0

NIST80053-VI-VC-CFG-00409

Built-in

vCenter

From a PowerCLI command prompt, while connected to the vCenter server run the following command:

Get-VDSwitch | select Name,@{N="NIOC Enabled";E={$_.ExtensionData.config.NetworkResourceManagementEnabled}}

If Network I/O Control is disabled, this is a finding.

Enabled

CCE-84355-7

NIST80053-VI-VC-CFG-00410

Enhanced

vCenter

From the vSphere Web Client go to Administration >> Single Sign-On >> Configuration >> Policies >> Password Policy.

If the Minimum Length is not set to at least 15, this is a finding.

15

CCE-84356-5

NIST80053-VI-VC-CFG-00411

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the vCenter server run the following commands:

$vds = Get-VDSwitch
$vds.ExtensionData.Config.HealthCheckConfig

If the health check feature is enabled on distributed switches and is not on temporarily for troubleshooting purposes, this is a finding.

FALSE

CCE-84357-3

NIST80053-VI-VC-CFG-00412

Enhanced

vCenter

From the vSphere Client, select the vCenter server at the top of the hierarchy and go to Alarms >> Definitions.

or

From a PowerCLI command prompt, while connected to the vCenter server run the following command:

Get-AlarmDefinition |
Where {$_.ExtensionData.Info.Expression.Expression.EventTypeId -eq "vim.event.PermissionUpdatedEvent"} |
Select Name,Enabled,@{N="EventTypeId";E={$_.ExtensionData.Info.Expression.Expression.EventTypeId}}

If there is not an alarm created to alert on permission update events, this is a finding.

Procedural

CCE-84358-1

NIST80053-VI-VC-CFG-00413

Built-in

vCenter

From the vSphere Web Client go to Administration >> Single Sign-On >> Configuration >> Policies >> Password Policy.

If Lower-Case Characters is not set to at least 1, this is a finding.

1

CCE-84359-9

NIST80053-VI-VC-CFG-00414

Enhanced

vCenter

From the vSphere Client, select the vCenter server at the top of the hierarchy and go to Alarms >> Definitions.

or

From a PowerCLI command prompt, while connected to the vCenter server run the following command:

Get-AlarmDefinition |
Where {$_.ExtensionData.Info.Expression.Expression.EventTypeId -eq "vim.event.PermissionAddedEvent"} |
Select Name,Enabled,@{N="EventTypeId";E={$_.ExtensionData.Info.Expression.Expression.EventTypeId}}

If there is not an alarm created to alert on permission addition events, this is a finding.

Procedural

CCE-84360-7

NIST80053-VI-VC-CFG-00415

Built-in

vCenter

From the vSphere Web Client, go to Administration >> Access Control >> Roles.

or

From a PowerCLI command prompt, while connected to the vCenter server run the following command:

Get-VIPermission | Sort Role | Select Role,Principal,Entity,Propagate,IsGroup | FT -Auto

Application service account and user required privileges should be documented.

If any user or service account has more privileges than required, this is a finding.

Procedural (Dependent on Customer Configurations)

CCE-84361-5

NIST80053-VI-VC-CFG-00416

Enhanced

vCenter

From the vSphere Client, select the vCenter server at the top of the hierarchy and go to Alarms >> Definitions.

or

From a PowerCLI command prompt, while connected to the vCenter server run the following command:

Get-AlarmDefinition |
Where {$_.ExtensionData.Info.Expression.Expression.EventTypeId -eq "vim.event.PermissionRemovedEvent"} |
Select Name,Enabled,@{N="EventTypeId";E={$_.ExtensionData.Info.Expression.Expression.EventTypeId}}

If there is not an alarm to alert on permission deletion events, this is a finding.

Procedural

CCE-84362-3

NIST80053-VI-VC-CFG-00417

Built-in

vCenter

From a PowerCLI command prompt, while connected to the vCenter server run the following command:

Get-VDPortgroup |
Select Name,VirtualSwitch,@{N="NetFlowEnabled";E={$_.Extensiondata.Config.defaultPortConfig.ipfixEnabled.Value}}

If NetFlow is configured and the collector IP is not known and is not enabled temporarily for troubleshooting purposes, this is a finding.

Known IPs

CCE-84363-1

NIST80053-VI-VC-CFG-00418

Enhanced

vCenter

If no clusters are enabled for VSAN, this is not applicable.

From the vSphere Web Client go to Host and Clusters >> Select a vCenter Server >> Configure >> vSAN >> Internet Connectivity >> Status.

If a proxy is not configured, this is a finding.

Procedural

CCE-84364-9

NIST80053-VI-VC-CFG-00419

Built-in

vCenter

From a PowerCLI command prompt, while connected to the vCenter server run the following command:

Get-VIPermission | Sort Role | Select Role,Principal,Entity,Propagate,IsGroup | FT -Auto

Application service account and user required privileges should be documented.

If any user or service account has more privileges than required, this is a finding.

Procedural (Dependent on Customer Configurations)

CCE-84365-6

NIST80053-VI-VC-CFG-00420

Built-in

vCenter

From the vSphere Web Client, go to Host and Clusters >> Select a Cluster >> Related Objects >> Datastores. Review the datastores. Identify any datastores with “vsan” as the datastore type.

or

From a PowerCLI command prompt, while connected to the vCenter server run the following command:

If($(Get-Cluster | where {$_.VsanEnabled} | Measure).Count -gt 0){
Write-Host "VSAN Enabled Cluster found"
Get-Cluster | where {$_.VsanEnabled} | Get-Datastore | where {$_.type -match "vsan"}
}
       Else{
Write-Host "VSAN is not enabled, this finding is not applicable"
}

If VSAN is enabled and the datastore is named “vsanDatastore”, this is a finding.

No name with “vsanDatastore”

CCE-84366-4

NIST80053-VI-VC-CFG-00421

Enhanced

vCenter

From the vSphere Web Client, go to Administration >> Single Sign-On >> Configuration >> Policies >> Password Policy.

If Maximum Lifetime is not set to 60, this is a finding.

60

CCE-84367-2

NIST80053-VI-VC-CFG-00422

Enhanced

vCenter

On the system where vCenter is installed, locate the webclient.properties file.

/etc/vmware/vsphere-client/ and /etc/vmware/vsphere-ui/

If session.timeout is not set to 10 (minutes), this is a finding.

10

CCE-84368-0

NIST80053-VI-VC-CFG-00427

Enhanced

vCenter

Get-AdvancedSetting -Entity <vcenter server name> -Name config.vpxd.hostPasswordLength

32

CCE-84369-8

NIST80053-VI-VC-CFG-00428

Built-in

vCenter

From the vSphere Web Client, go to vCenter Inventory Lists >> vCenter Servers >> Select your vCenter Server >> Settings >> Advanced System Settings.

or

From a PowerCLI command prompt, while connected to the vCenter server run the following command:

Get-AdvancedSetting -Entity <vcenter server name> -Name VirtualCenter.VimPasswordExpirationInDays

If VirtualCenter.VimPasswordExpirationInDays is set to a value other than 30 or does not exist, this is a finding.

FALSE

CCE-84370-6

NIST80053-VI-VC-CFG-00429

Built-in

vCenter

Check the following conditions:
1. The Update Manager must be configured to use the Update Manager Download Server.
2. The use of physical media to transfer update files to the Update Manager server (air-gap model example: separate Update Manager Download Server which may source vendor patches externally via the internet versus an internal source) must be enforced with site policies.

To verify download settings, from the vSphere Client/vCenter Server system, click Update Manager. Select a Host and then click the Settings tab. In the Download Settings tab, find “Direct connection to Internet.”

If “Direct connection to Internet” is configured, this is a finding.
If all of the above conditions are not met, this is a finding.

Procedural

CCE-84371-4

NIST80053-VI-VC-CFG-00432

Built-in

vCenter

From the vSphere Web Client, go to Administration >> Single Sign-On >> Configuration >> Policies >> Password Policy.

If Special Characters is not set to at least 1, this is a finding.

1

CCE-84372-2

NIST80053-VI-VC-CFG-00433

Built-in

vCenter

From the vSphere Web Client, go to Administration >> Single Sign-On >> Configuration >> Policies >> Password Policy.

If Numeric Characters is not set to at least 1, this is a finding.

1

CCE-84373-0

NIST80053-VI-VC-CFG-00434

Enhanced

vCenter

From the vSphere Web Client, go to Administration >> Single Sign-On >> Configuration >> Policies >> Lockout Policy.

If the Time interval between failures is not set to at least 900, this is a finding.

900

CCE-84374-8

NIST80053-VI-VC-CFG-00435

Enhanced

vCenter

From the vSphere Web Client, go to Administration >> Single Sign-On >> Configuration >> Policies >> Lockout Policy.

If the Unlock time is not set to 0, this is a finding.

0

CCE-84375-5

NIST80053-VI-VC-CFG-00436

Enhanced

vCenter

From the vSphere Web Client, go to Administration >> Single Sign-On >> Configuration >> Policies >> Lockout Policy.

If the Maximum number of failed login attempts is not set to 3, this is a finding.

3

CCE-84376-3

NIST80053-VI-VC-CFG-00437

Enhanced

vCenter

From the vSphere Web Client go to vCenter Inventory Lists >> vCenter Servers >> Select your vCenter Server >> Settings >> Advanced Settings.

or

From a PowerCLI command prompt, while connected to the vCenter server run the following command:

Get-AdvancedSetting -Entity <vcenter server name> -Name config.nfc.useSSL

If config.nfc.useSSL is not set to true, this is a finding.

TRUE

CCE-84377-1

NIST80053-VI-VC-CFG-00439

Built-in

vCenter

If the built-in SSO administrator account is used for daily operations or there is no policy restricting its use, this is a finding.

Procedural

CCE-84378-9

NIST80053-VI-VC-CFG-00440

Enhanced

vCenter

From the vSphere Web Client, go to Networking >> Select a distributed port group >> Manage >> Settings >> Properties. View the Override port policies.

or

From a PowerCLI command prompt, while connected to the vCenter server run the following command:

Get-VDPortgroup | Get-View |
Select Name,
@{N="VlanOverrideAllowed";E={$_.Config.Policy.VlanOverrideAllowed}},
@{N="UplinkTeamingOverrideAllowed";E={$_.Config.Policy.UplinkTeamingOverrideAllowed}},
@{N="SecurityPolicyOverrideAllowed";E={$_.Config.Policy.SecurityPolicyOverrideAllowed}},
@{N="IpfixOverrideAllowed";E={$_.Config.Policy.IpfixOverrideAllowed}},
@{N="BlockOverrideAllowed";E={$_.Config.Policy.BlockOverrideAllowed}},
@{N="ShapingOverrideAllowed";E={$_.Config.Policy.ShapingOverrideAllowed}},
@{N="VendorConfigOverrideAllowed";E={$_.Config.Policy.VendorConfigOverrideAllowed}},
@{N="TrafficFilterOverrideAllowed";E={$_.Config.Policy.TrafficFilterOverrideAllowed}},
@{N="PortConfigResetAtDisconnect";E={$_.Config.Policy.PortConfigResetAtDisconnect}} | Sort Name

Note: This was broken up into multiple lines for readability. Either paste as is into a PowerShell script or combine into one line and run.

This does not apply to the reset port configuration on disconnect policy.

If any port-level overrides are enabled and not documented, this is a finding.

disabled

CCE-84379-7

NIST80053-VI-VC-CFG-00442

Enhanced

vCenter

From the vSphere Client, select the vCenter server at the top of the hierarchy and go to Alarms >> Definitions.

or

From a PowerCLI command prompt, while connected to the vCenter server run the following command:

Get-AlarmDefinition |
Where {$_.ExtensionData.Info.Expression.Expression.EventTypeId -eq "esx.problem.vmsyslogd.remote.failure"} |
Select Name,Enabled,@{N="EventTypeId";E={$_.ExtensionData.Info.Expression.Expression.EventTypeId}}

If there is no alarm created to alert if an ESXi host can no longer reach its syslog server, this is a finding.

Enabled

CCE-84380-5

NIST80053-VI-VC-CFG-00445

Built-in

vCenter

If IP-based storage is not used, this is not applicable.

IP-based storage (iSCSI, NFS, VSAN) VMkernel port groups must be in a dedicated VLAN that can be on a common standard or distributed virtual switch that is logically separated from other traffic types. The check for this will be unique per environment.

From the vSphere Client, select Networks >> Distributed Port Groups and review the VLANs associated with any IP-based storage VMkernels.

If any IP-based storage networks are not isolated from other traffic types, this is a finding.

Unique IP addresses

CCE-84381-3

NIST80053-VI-VC-CFG-00447

Built-in

vCenter

Log in to the vCenter server and view the local administrators group membership.

If the local administrators group contains users and/or groups that are not vCenter Administrators such as “Domain Admins”, this is a finding.

Only necessary users and groups

CCE-84382-1

NIST80053-VI-VC-CFG-00450

Built-in

vCenter

From the vSphere Client, go to Home >> Networking. Select a distributed port group, click Edit, then go to Security.

or

From a PowerCLI command prompt, while connected to the vCenter server run the following commands:

Get-VDSwitch | Get-VDSecurityPolicy
Get-VDPortgroup | ?{$_.IsUplink -eq $false} | Get-VDSecurityPolicy

If the Forged Transmits policy is set to accept for a non-uplink port, this is a finding.

reject

CCE-84383-9

NIST80053-VI-VC-CFG-00455

Enhanced

vCenter

If the vSphere Storage API - Data Protection (VADP) solution is not configured for performing backup and restore of the management components, this is a finding.

vSphere Storage API - Data Protection (VADP)

CCE-84384-7

NIST80053-VI-VC-CFG-00497

Built-in

vCenter

On the Edit port group - VM Network window, check for input 1611 for VLAN ID.

If the vlan is 1611, this is a finding.

Not 1611

CCE-84385-4

NIST80053-VI-VC-CFG-00555

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name svga.vgaonly

If svga.vgaonly does not exist or is not set to true, this is a finding.

TRUE

CCE-84386-2

NIST80053-VI-VC-CFG-00561

Enhanced

vCenter

From a PowerCLI command prompt, while connected to the ESXi host or vCenter server run the following command:

Get-VM "VM Name" | Get-AdvancedSetting -Name pciPassthru*.present

If pciPassthru*.present does not exist or is not set to false, this is a finding.

FALSE

CCE-84601-4

NIST80053-VI-Storage-SDS-CFG-00178

Enhanced

vSAN

From a PowerCLI command prompt, while connected to the vCenter server run the following command:

Get-VIPermission | Where {$_.Role -eq "Admin"} | Select Role,Principal,Entity,Propagate,IsGroup | FT -Auto

If there are any users other than Solution Users with the Administrator role that are not explicitly designated for cryptographic operations, this is a finding.

No Cryptography Administrator

CCE-84602-2

NIST80053-VI-Storage-SDS-CFG-00180

Built-in

vSAN

From a PowerCLI command prompt, while connected to the ESXi host run the following commands:

Get-VMHost | Get-VMHostNTPServer
Get-VMHost | Get-VMHostService | Where {$_.Label -eq "NTP Daemon"}

If the NTP service is not configured with authoritative DoD time sources and the service is not configured to start and stop with the host and is running, this is a finding.

Correct date and timestamp

CCE-84603-0

NIST80053-VI-Storage-SDS-CFG-00181

Built-in

vSAN

Log in to the vRealize Log Insight user interface. Click the configuration drop-down menu icon and select Content Packs. Under Content Pack Marketplace, select Marketplace.

If the VMware - vSAN content pack does not appear in the Installed Content Packs list, this is a finding.

VMware - vSAN

CCE-84604-8

NIST80053-VI-Storage-SDS-CFG-00182

Built-in

vSAN

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-AdvancedSetting -Name UserVars.HostClientSessionTimeout

If UserVars.HostClientSessionTimeout is not set to 900, this is a finding.

900

CCE-84605-5

NIST80053-VI-Storage-SDS-CFG-00183

Enhanced

vSAN

From the vSphere client, select the cluster. Click the Configure tab and under vSAN, click Services.

If Encryption is not enabled or the KMS cluster is not configured, this is a finding.

Enabled

CCE-84606-3

NIST80053-VI-Storage-SDS-CFG-00184

Built-in

vSAN

Perform a compliance check on the inventory objects to make sure that you have all the latest security patches and updates applied. Use the vSphere Client to log in to a vCenter Server Appliance or to a vCenter Server system with which Update Manager is registered.

If all the latest security patches and updates are not applied, this is a finding.

Up-to-date patches and upgrades

CCE-84607-1

NIST80053-VI-Storage-SDS-CFG-00185

Built-in

vSAN

From a PowerCLI command prompt, while connected to the ESXi host run the following command:

Get-VMHost | Get-AdvancedSetting -Name Syslog.global.logHost

If Syslog.global.logHost is not set to a site-specific syslog server, this is a finding.

udp://sfo01vrli01.sfo01.rainpole.local:514

CCE-84608-9

NIST80053-VI-Storage-SDS-CFG-00204

Enhanced

vSAN

From a PowerCLI command prompt, while connected to the vCenter server run the following command:

Get-VIPermission | Where {$_.Role -eq "Admin"} | Select Role,Principal,Entity,Propagate,IsGroup | FT -Auto

If there are any users other than Solution Users with the Administrator role that are not explicitly designated for cryptographic operations, this is a finding.

No Cryptography Administrator

CCE-84609-7

NIST80053-VI-Storage-SDS-CFG-00207

Enhanced

vSAN

If VSAN Health Check is installed:
From the vSphere Client, go to Host and Clusters. Select a vCenter Server and go to Configure > vSAN > Internet Connectivity > Status.

If “Enable Internet access for this cluster” is enabled and a proxy is not configured, this is a finding.

Proxy should be configured

CCE-84610-5

NIST80053-VI-Storage-SDS-CFG-00208

Built-in

vSAN

From a PowerCLI command prompt, while connected to the vCenter server run the following command:

If($(Get-Cluster | where {$_.VsanEnabled} | Measure).Count -gt 0){
Write-Host "VSAN Enabled Cluster found"
Get-Cluster | where {$_.VsanEnabled} | Get-Datastore | where {$_.type -match "vsan"}
}
       Else{
Write-Host "VSAN is not enabled, this finding is not applicable"
}

If VSAN is enabled and the datastore is named “vsanDatastore”, this is a finding.

Datastore name is unique

CCE-84611-3

NIST80053-VI-Storage-SDS-CFG-00179

Enhanced

vSAN

From a PowerCLI command prompt, while connected to the ESXi host run the following commands:

$esxcli = Get-EsxCli
$esxcli.system.coredump.network.get()

If there is no active core dump partition or the network core dump collector is not configured and enabled, this is a finding.

TRUE

CCE-84612-1

NIST80053-VI-Storage-SDS-CFG-00186

Enhanced

vSAN

Make sure you have sufficient capacity in the management vSAN cluster for the management virtual machines.

If you do not have sufficient capacity, this is a finding.

Procedural

Appendix B List of Acronyms

AD

Active Directory

API

Application Programming Interface

BIOS

Basic Input/Output System

BOM

Bill of Materials

CA

Certificate Authority

CAC

Common Access Card

CAM

Content Addressable Memory

CCE

Common Configuration Enumeration

CLI

Command Line Interface

CRADA

Cooperative Research and Development Agreement

D@RE

(Dell EMC Unity) Data at Rest Encryption

DHCP

Dynamic Host Configuration Protocol

DISA

Defense Information Systems Agency

DNS

Domain Name System

DoD

Department of Defense

EFI

Extensible Firmware Interface

FIPS

Federal Information Processing Standards

FTP

File Transfer Protocol

GB

Gigabyte

Gb/s

Gigabits per Second

GHz

Gigahertz

GKH

Good Known Host

GUI

Graphical User Interface

HSM

Hardware Security Module

HTCC

HyTrust CloudControl

IaaS

Infrastructure as a Service

ICSV

IBM Cloud Secure Virtualization

IOPS

Input/Output Operations per Second

IP

Internet Protocol

IPsec

Internet Protocol Security

IT

Information Technology

KMS

Key Management System

LACP

Link Aggregation Control Protocol

LLDP

Link Layer Discovery Protocol

MAC

Media Access Control

MLE

Measured Launch Environment

MOB

(vCenter) Managed Object Browser

NCCoE

National Cybersecurity Center of Excellence

NFS

Network File System

NIC

Network Interface Card

NIST

National Institute of Standards and Technology

NISTIR

National Institute of Standards and Technology Internal Report

NSX-V

NSX for vSphere

NTLS

Network Trust Links

NTP

Network Time Protocol

OS

Operating System

OSPF

Open Shortest Path First

OU

Organizational Unit

OVA

Open Virtual Appliance

PDC

Physical Data Center

PIV

Personal Identity Verification

PSC

Platform Services Controller

PXE

Preboot Execution Environment

RAM

Random Access Memory

RPC

Remote Procedure Call

SAS

Serial Attached SCSI

SCSI

Small Computer System Interface

SDDC

Software Defined Data Center

SED

Self-Encrypting Drive

SFTP

Secure File Transfer Protocol

SHA

Secure Hash Algorithm

SLES

SUSE Linux Enterprise Server

SMTP

Simple Mail Transfer Protocol

SNMP

Simple Network Management Protocol

SP

Special Publication, Storage Processor

SSD

Solid State Drive

SSH

Secure Shell

SSO

Single Sign-On

STIG

Security Technical Implementation Guide

TB

Terabyte

TCP

Transmission Control Protocol

TLS

Transport Layer Security

TPM

Trusted Platform Module

TXT

(Intel) Trusted Execution Technology

UCR

Unified Capabilities Requirements

UEFI

Unified Extensible Firmware Interface

UI

User Interface

UMDS

Update Manager Download Service

URL

Uniform Resource Locator

USB

Universal Serial Bus

UUID

Universally Unique Identifier

VADP

vSphere Storage APIs for Data Protection

VCF

VMware Cloud Foundation

VCS

vCenter Server

VLAN

Virtual Local Area Network

VM

Virtual Machine

VMX

Virtual Machine Extensions

VPN

Virtual Private Network

vR

vSphere Replication

vRA

vRealize Automation

vRLI

vRealize Log Insight

vROPS

vRealize Operations Manager

VSAN

Virtual Storage Area Network

VSI

Virtual Storage Integrator

VT

(Intel) Virtualization Technology

VVD

VMware Validated Design

Appendix C Glossary

All significant technical terms used within this document are defined in other key documents, particularly National Institute of Standards and Technology Internal Report (NISTIR) 7904, Trusted Geolocation in the Cloud: Proof of Concept Implementation. As a convenience to the reader, terms critical to understanding this volume are provided in this glossary.

Cloud workload

A logical bundle of software and data that is present in, and processed by, a cloud computing technology.

Geolocation

Determining the approximate physical location of an object, such as a cloud computing server.

Hardware root of trust

An inherently trusted combination of hardware and firmware that maintains the integrity of information.

Trusted compute pool

A physical or logical grouping of computing hardware in a data center that is tagged with specific and varying security policies. Within a trusted compute pool, the access and execution of applications and workloads are monitored, controlled, audited, etc. Also known as a trusted pool.