DISA STIG VMWare ESXi vCenter 5 STIG v1r7

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: DISA STIG VMWare ESXi vCenter 5 STIG v1r7

Updated: 4/25/2022

Authority: DISA STIG

Plugin: VMware

Revision: 1.9

Estimated Item Count: 23

File Details

Filename: DISA_STIG_VMware_ESXi-vCenter_5_v1r7.audit

Size: 37.6 kB

Audit Items

DescriptionCategories
VCENTER-000003 - The VMware Update Manager must not be configured to manage its own VM or the VM of its vCenter Server
VCENTER-000005 - Privilege re-assignment must be checked after the vCenter Server restarts
VCENTER-000006 - The Web datastore browser must be disabled, unless required for normal day-to-day operations.
VCENTER-000007 - The MOB must be disabled when not required for the purpose of troubleshooting or maintenance of managed objects
VCENTER-000008 - The vCenter Server must be installed using a service account instead of a built-in Windows account
VCENTER-000009 - Connectivity between Update Manager and patch repositories must be restricted by an Update Manager Download Server
VCENTER-000012 - The vCenter Server administrative users must have the correct roles assigned
VCENTER-000013 - Access to SSL certificates must be monitored
VCENTER-000015 - Expired certificates must be removed from the vCenter Server
VCENTER-000016 - Log files must be cleaned up after failed installations of the vCenter Server
VCENTER-000017 - Revoked certificates must be removed from the vCenter Server
VCENTER-000018 - The vCenter Administrator role must be secured and assigned to specific users other than a Windows Administrator
VCENTER-000019 - Revoked certificates must be removed from the vCenter Server
VCENTER-000020 - System must restrict unauthorized vSphere users from being able to execute commands within the guest virtual machine
VCENTER-000021 - The use of Linux-based clients must be restricted
VCENTER-000022 - Network access to the vCenter Server system must be restricted
VCENTER-000023 - Network access to the vCenter Server system must be restricted
VCENTER-000024 - A least-privileges assignment must be used for the Update Manager database user
VCENTER-000027 - The system must set a timeout for all thick-client logins without activity
VCENTER-000029 - vSphere Client plugins must be verified

CONFIGURATION MANAGEMENT

VCENTER-000031 - The vCenter Administrator role must be secured by assignment to specific users authorized as vCenter Administrators
VCENTER-000033 - The Update Manager Download Server must be isolated from Internet public patch repositories by a proxy server
VCENTER-000034 - The Update Manager must not directly connect to public patch repositories on the Internet