DISA STIG VMWare ESXi 5 Virtual Machine STIG v1r7

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: DISA STIG VMWare ESXi 5 Virtual Machine STIG v1r7

Updated: 4/25/2022

Authority: DISA STIG

Plugin: VMware

Revision: 1.9

Estimated Item Count: 53

File Details

Filename: DISA_STIG_VMware_ESXi-VirtualMachine_5_v1r7.audit

Size: 228 kB

MD5: c6c67f3e8958ec9ed2c80f045ef34a3c
SHA256: 4e0d69911906f89d05a719bc254dc29db57a255f1e558a57910dd86c5f806109

Audit Items

DescriptionCategories
ESXI5-VM-000001 - The system must control virtual machine access to host resources - 'Memory limit'

SYSTEM AND COMMUNICATIONS PROTECTION

ESXI5-VM-000001 - The system must control virtual machine access to host resources - 'Memory reservation'

SYSTEM AND COMMUNICATIONS PROTECTION

ESXI5-VM-000001 - The system must control virtual machine access to host resources - 'Memory share'

SYSTEM AND COMMUNICATIONS PROTECTION

ESXI5-VM-000002 - The system must disable tools auto install

CONFIGURATION MANAGEMENT

ESXI5-VM-000003 - The system must explicitly disable copy operations

CONFIGURATION MANAGEMENT

ESXI5-VM-000004 - The system must explicitly disable drag and drop operations

CONFIGURATION MANAGEMENT

ESXI5-VM-000005 - The system must explicitly disable any GUI functionality for copy/paste operations

CONFIGURATION MANAGEMENT

ESXI5-VM-000006 - The system must explicitly disable paste operations

CONFIGURATION MANAGEMENT

ESXI5-VM-000007 - The system must disable virtual disk shrinking

CONFIGURATION MANAGEMENT

ESXI5-VM-000008 - The system must disable virtual disk erasure

CONFIGURATION MANAGEMENT

ESXI5-VM-000009 - The system must disable HGFS file transfers

CONFIGURATION MANAGEMENT

ESXI5-VM-000010 - The system must not use independent, nonpersistent disks

AUDIT AND ACCOUNTABILITY

ESXI5-VM-000011 - The system must disable VM-to-VM communication through VMCI

SYSTEM AND COMMUNICATIONS PROTECTION

ESXI5-VM-000012 - The system must enable VM logging

CONFIGURATION MANAGEMENT

ESXI5-VM-000013 - The system must disable VM Monitor Control during normal operation

CONFIGURATION MANAGEMENT

ESXI5-VM-000014 - Unexposed feature isolation.tools.ghi.autologon.disable must be initialized to decrease the VMs attack vectors

ACCESS CONTROL

ESXI5-VM-000015 - Unexposed feature isolation.bios.bbs.disable must be initialized to decrease the VMs attack vectors

CONFIGURATION MANAGEMENT

ESXI5-VM-000016 - Unexposed feature isolation.tools.getCreds.disable must be initialized to decrease the VMs attack vectors

CONFIGURATION MANAGEMENT

ESXI5-VM-000017 - Unexposed feature isolation.tools.ghi.launchmenu.change must be initialized to decrease the VMs attack vectors

CONFIGURATION MANAGEMENT

ESXI5-VM-000018 - Unexposed feature isolation.tools.memSchedFakeSampleStats.disable must be initialized to decrease VMs attack vectors

CONFIGURATION MANAGEMENT

ESXI5-VM-000019 - Unexposed feature isolation.tools.ghi.protocolhandler.info.disable must be initialized to decrease VMs attack vectors

CONFIGURATION MANAGEMENT

ESXI5-VM-000020 - Unexposed feature isolation.ghi.host.shellAction.disable must be initialized to decrease the VMs attack vectors

CONFIGURATION MANAGEMENT

ESXI5-VM-000021 - Unexposed feature isolation.tools.dispTopoRequest.disable must be initialized to decrease the VMs attack vectors

CONFIGURATION MANAGEMENT

ESXI5-VM-000022 - Unexposed feature isolation.tools.trashFolderState.disable must be initialized to decrease the VMs attack vectors

CONFIGURATION MANAGEMENT

ESXI5-VM-000023 - Unexposed feature isolation.tools.ghi.trayicon.disable must be initialized to decrease the VMs attack vectors

CONFIGURATION MANAGEMENT

ESXI5-VM-000024 - Unexposed feature isolation.tools.unity.disable must be initialized to decrease the VMs attack vectors

CONFIGURATION MANAGEMENT

ESXI5-VM-000025 - Unexposed feature isolation.tools.unityInterlockOperation.disable must be initialized to decrease VMs attack vectors

CONFIGURATION MANAGEMENT

ESXI5-VM-000026 - Unexposed feature isolation.tools.unity.push.update.disable must be initialized to decrease the VMs attack vectors

CONFIGURATION MANAGEMENT

ESXI5-VM-000027 - Unexposed feature isolation.tools.unity.taskbar.disable must be initialized to decrease the VMs attack vectors

CONFIGURATION MANAGEMENT

ESXI5-VM-000028 - Unexposed feature isolation.tools.unityActive.disable must be initialized to decrease the VMs attack vectors

CONFIGURATION MANAGEMENT

ESXI5-VM-000029 - Unexposed feature isolation.tools.unity.windowContents.disable must be initialized to decrease the VMs attack vectors

CONFIGURATION MANAGEMENT

ESXI5-VM-000030 - Unexposed feature isolation.tools.vmxDnDVersionGet.disable must be initialized to decrease the VMs attack vector

CONFIGURATION MANAGEMENT

ESXI5-VM-000031 - Unexposed feature isolation.tools.guestDnDVersionSet.disable must be initialized to decrease the VMs attack vectors

CONFIGURATION MANAGEMENT

ESXI5-VM-000033 - The system must disable VIX messages from the VM

CONFIGURATION MANAGEMENT

ESXI5-VM-000034 - The system must disconnect unauthorized floppy devices

MEDIA PROTECTION

ESXI5-VM-000035 - The system must disconnect unauthorized IDE devices

CONFIGURATION MANAGEMENT

ESXI5-VM-000036 - The system must disconnect unauthorized parallel devices

CONFIGURATION MANAGEMENT

ESXI5-VM-000037 - The system must disconnect unauthorized serial devices

CONFIGURATION MANAGEMENT

ESXI5-VM-000038 - The system must disconnect unauthorized USB devices

MEDIA PROTECTION

ESXI5-VM-000039 - The system must limit sharing of console connections

CONFIGURATION MANAGEMENT

ESXI5-VM-000041 - The system must limit VM logging records

AUDIT AND ACCOUNTABILITY

ESXI5-VM-000042 - The system must limit VM logging record contents

AUDIT AND ACCOUNTABILITY

ESXI5-VM-000043 - The system must limit informational messages from the VM to the VMX file

CONFIGURATION MANAGEMENT

ESXI5-VM-000044 - The system must minimize use of the VM console
ESXI5-VM-000045 - System must prevent removal/connection/mod of devices by setting isolation.device.connectable.disable to true

ACCESS CONTROL

ESXI5-VM-000046 - The system must prevent unauthorized removal, connection and modification of devices

ACCESS CONTROL

ESXI5-VM-000047 - The system must not send host information to guests

CONFIGURATION MANAGEMENT

ESXI5-VM-000049 - The system must use secure protocols for virtual serial port access
ESXI5-VM-000050 - The system must use templates to deploy VMs whenever possible
ESXI5-VM-000051 - The system must control access to VMs through the dvfilter network APIs

ACCESS CONTROL