DISA_STIG_VMware_vSphere_ESXi_6.5_Bare_Metal_Host_v2r4.audit from DISA VMware vSphere 6.5 ESXi v2r4 STIG | |
ESXI-65-000009 - The ESXi host SSH daemon must be configured with the Department of Defense (DoD) login banner. | ACCESS CONTROL |
ESXI-65-000010 - The ESXi host SSH daemon must use DoD-approved encryption to protect the confidentiality of remote access sessions. | ACCESS CONTROL |
ESXI-65-000011 - The ESXi host SSH daemon must be configured to use only the SSHv2 protocol. | ACCESS CONTROL |
ESXI-65-000012 - The ESXi host SSH daemon must ignore .rhosts files. | IDENTIFICATION AND AUTHENTICATION |
ESXI-65-000013 - The ESXi host SSH daemon must not allow host-based authentication. | CONFIGURATION MANAGEMENT |
ESXI-65-000014 - The ESXi host SSH daemon must not permit root logins. | CONFIGURATION MANAGEMENT |
ESXI-65-000015 - The ESXi host SSH daemon must not allow authentication using an empty password. | CONFIGURATION MANAGEMENT |
ESXI-65-000016 - The ESXi host SSH daemon must not permit user environment settings. | CONFIGURATION MANAGEMENT |
ESXI-65-000017 - The ESXi host SSH daemon must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms. | CONFIGURATION MANAGEMENT |
ESXI-65-000018 - The ESXi host SSH daemon must not permit GSSAPI authentication. | CONFIGURATION MANAGEMENT |
ESXI-65-000019 - The ESXi host SSH daemon must not permit Kerberos authentication. | CONFIGURATION MANAGEMENT |
ESXI-65-000020 - The ESXi host SSH daemon must perform strict mode checking of home directory configuration files. | CONFIGURATION MANAGEMENT |
ESXI-65-000021 - The ESXi host SSH daemon must not allow compression or must only allow compression after successful authentication. | CONFIGURATION MANAGEMENT |
ESXI-65-000022 - The ESXi host SSH daemon must be configured to not allow gateway ports. | CONFIGURATION MANAGEMENT |
ESXI-65-000023 - The ESXi host SSH daemon must be configured to not allow X11 forwarding. | CONFIGURATION MANAGEMENT |
ESXI-65-000024 - The ESXi host SSH daemon must not accept environment variables from the client. | CONFIGURATION MANAGEMENT |
ESXI-65-000025 - The ESXi host SSH daemon must not permit tunnels. | CONFIGURATION MANAGEMENT |
ESXI-65-000026 - The ESXi host SSH daemon must set a timeout count on idle sessions. | CONFIGURATION MANAGEMENT |
ESXI-65-000027 - The ESXi hostSSH daemon must set a timeout interval on idle sessions. | CONFIGURATION MANAGEMENT |
ESXI-65-000028 - The ESXi host SSH daemon must limit connections to a single session. | CONFIGURATION MANAGEMENT |
ESXI-65-000029 - The ESXi host must remove keys from the SSH authorized_keys file. | CONFIGURATION MANAGEMENT |
ESXI-65-000032 - The ESXi host must prohibit the reuse of passwords within five iterations. | IDENTIFICATION AND AUTHENTICATION |
ESXI-65-000033 - The password hashes stored on the ESXi host must have been generated using a FIPS 140-2 approved cryptographic hashing algorithm. | CONFIGURATION MANAGEMENT |
ESXI-65-000044 - The ESXi host must enable kernel core dumps. | SYSTEM AND COMMUNICATIONS PROTECTION |
ESXI-65-000047 - The ESXi Image Profile and VIB Acceptance Levels must be verified. | CONFIGURATION MANAGEMENT |
ESXI-65-000056 - The ESXi host must configure the firewall to restrict access to services running on the host. | CONFIGURATION MANAGEMENT |
ESXI-65-000076 - The ESXi host must enable Secure Boot. | CONFIGURATION MANAGEMENT |
ESXI-65-000078 - The ESXi host must use DoD-approved certificates. | CONFIGURATION MANAGEMENT |