DISA STIG VMware vSphere 6.7 ESXi v1r2

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: DISA STIG VMware vSphere 6.7 ESXi v1r2

Updated: 10/31/2023

Authority: DISA STIG

Plugin: VMware

Revision: 1.6

Estimated Item Count: 48

File Details

Filename: DISA_STIG_VMware_vSphere_6.7_ESXi_v1r2.audit

Size: 117 kB

MD5: a1571066bfe2eefea2519d63a4d67753
SHA256: bff5d3c43a735996e1072952b837dc413e30089e93e1d00f1f84a57411db78ed

Audit Items

DescriptionCategories
ESXI-67-000001 - Access to the ESXi host must be limited by enabling Lockdown Mode.
ESXI-67-000002 - The ESXi host must verify the DCUI.Access list.
ESXI-67-000003 - The ESXi host must verify the exception users list for Lockdown Mode.
ESXI-67-000004 - Remote logging for ESXi hosts must be configured.
ESXI-67-000005 - The ESXi host must enforce the limit of three consecutive invalid logon attempts by a user.
ESXI-67-000006 - The ESXi host must enforce the unlock timeout of 15 minutes after a user account is locked out.
ESXI-67-000007 - The ESXi host must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system via the DCUI.
ESXI-67-000008 - The ESXi host must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system via SSH.
ESXI-67-000030 - The ESXi host must produce audit records containing information to establish what type of events occurred.
ESXI-67-000031 - The ESXi host must enforce password complexity by requiring that at least one uppercase character be used.
ESXI-67-000032 - The ESXi host must prohibit the reuse of passwords within five iterations.
ESXI-67-000034 - The ESXi host must disable the Managed Object Browser (MOB).
ESXI-67-000035 - The ESXi host must be configured to disable nonessential capabilities by disabling SSH.
ESXI-67-000036 - The ESXi host must disable ESXi Shell unless needed for diagnostics or troubleshooting.
ESXI-67-000037 - The ESXi host must use Active Directory for local user authentication.
ESXI-67-000038 - ESXi hosts using Host Profiles and/or Auto Deploy must use the vSphere Authentication Proxy to protect passwords when adding themselves to Active Directory.
ESXI-67-000039 - Active Directory ESX Admin group membership must not be used when adding ESXi hosts to Active Directory.
ESXI-67-000040 - The ESXi host must use multifactor authentication for local DCUI access to privileged accounts.
ESXI-67-000041 - The ESXi host must set a timeout to automatically disable idle shell sessions after two minutes.
ESXI-67-000042 - The ESXi host must terminate shell services after 10 minutes.
ESXI-67-000043 - The ESXi host must log out of the console UI after two minutes.
ESXI-67-000045 - The ESXi host must enable a persistent log location for all locally stored logs.
ESXI-67-000046 - The ESXi host must configure NTP time synchronization.
ESXI-67-000048 - The ESXi host must protect the confidentiality and integrity of transmitted information by isolating vMotion traffic.
ESXI-67-000049 - The ESXi host must protect the confidentiality and integrity of transmitted information by protecting ESXi management traffic.
ESXI-67-000050 - The ESXi host must protect the confidentiality and integrity of transmitted information by isolating IP-based storage traffic.
ESXI-67-000052 - The ESXi host must protect the confidentiality and integrity of transmitted information by using different TCP/IP stacks where possible.
ESXI-67-000053 - SNMP must be configured properly on the ESXi host.
ESXI-67-000054 - The ESXi host must enable bidirectional CHAP authentication for iSCSI traffic.
ESXI-67-000055 - The ESXi host must disable Inter-VM transparent page sharing.
ESXI-67-000057 - The ESXi host must configure the firewall to block network traffic by default - incoming
ESXI-67-000057 - The ESXi host must configure the firewall to block network traffic by default - outgoing
ESXI-67-000058 - The ESXi host must enable BPDU filter on the host to prevent being locked out of physical switch ports with Portfast and BPDU Guard enabled.
ESXI-67-000059 - The virtual switch Forged Transmits policy must be set to reject on the ESXi host.
ESXI-67-000060 - The virtual switch MAC Address Change policy must be set to reject on the ESXi host.
ESXI-67-000061 - The virtual switch Promiscuous Mode policy must be set to reject on the ESXi host.
ESXI-67-000062 - The ESXi host must prevent unintended use of the dvFilter network APIs.
ESXI-67-000063 - For the ESXi host, all port groups must be configured to a value other than that of the native VLAN.
ESXI-67-000064 - For the ESXi host, all port groups must not be configured to VLAN 4095 unless Virtual Guest Tagging (VGT) is required - VGT is required.
ESXI-67-000065 - For the ESXi host, all port groups must not be configured to VLAN values reserved by upstream physical switches.
ESXI-67-000066 - For physical switch ports connected to the ESXi host, the non-negotiate option must be configured for trunk links between external physical switches and virtual switches in Virtual Switch Tagging (VST) mode.
ESXI-67-000067 - All ESXi host-connected physical switch ports must be configured with spanning tree disabled.
ESXI-67-000068 - All ESXi host-connected virtual switch VLANs must be fully documented and have only the required VLANs.
ESXI-67-000070 - The ESXi host must not provide root/administrator-level access to CIM-based hardware monitoring tools or other third-party applications.
ESXI-67-000071 - The SA must verify the integrity of the installation media before installing ESXi.
ESXI-67-000072 - The ESXi host must have all security patches and updates installed.
ESXI-67-000074 - The ESXi host must exclusively enable TLS 1.2 for all endpoints.
ESXI-67-000079 - The ESXi host must not suppress warnings that the local or remote shell sessions are enabled.