DISA VMware vSphere 8.0 ESXi STIG v2r2

Audit Details

Name: DISA VMware vSphere 8.0 ESXi STIG v2r2

Updated: 3/31/2025

Authority: DISA STIG

Plugin: VMware

Revision: 1.0

Estimated Item Count: 53

File Details

Filename: DISA_VMware_vSphere_8.0_ESXi_STIG_v2r2.audit

Size: 167 kB

MD5: 64f968003ca42adde39d652dc4402499
SHA256: 5e3ce242d1ca1db090bc0eebc8cdb8fda1cefa9bcc05e322c465e64ca1a489a1

Audit Items

DescriptionCategories
ESXI-80-000005 - The ESXi host must enforce the limit of three consecutive invalid logon attempts by a user.

ACCESS CONTROL

ESXI-80-000006 - The ESXi host must display the Standard Mandatory DOD Notice and Consent Banner before granting access to the system via the Direct Console User Interface (DCUI).

ACCESS CONTROL

ESXI-80-000008 - The ESXi host must enable lockdown mode.

ACCESS CONTROL

ESXI-80-000010 - The ESXi host client must be configured with an idle session timeout.

ACCESS CONTROL

ESXI-80-000015 - The ESXi must produce audit records containing information to establish what type of events occurred.

AUDIT AND ACCOUNTABILITY

ESXI-80-000035 - The ESXi host must enforce password complexity by configuring a password quality policy.

IDENTIFICATION AND AUTHENTICATION

ESXI-80-000043 - The ESXi host must prohibit password reuse for a minimum of five generations.

IDENTIFICATION AND AUTHENTICATION

ESXI-80-000047 - The ESXi host must be configured to disable nonessential capabilities by disabling the Managed Object Browser (MOB).

CONFIGURATION MANAGEMENT

ESXI-80-000049 - The ESXi host must uniquely identify and must authenticate organizational users by using Active Directory.

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

ESXI-80-000068 - The ESXi host must set a timeout to automatically end idle shell sessions after fifteen minutes.

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-80-000111 - The ESXi host must enforce an unlock timeout of 15 minutes after a user account is locked out.

ACCESS CONTROL

ESXI-80-000113 - The ESXi host must allocate audit record storage capacity to store at least one week's worth of audit records.

AUDIT AND ACCOUNTABILITY

ESXI-80-000114 - The ESXi host must offload logs via syslog.

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

ESXI-80-000124 - The ESXi host must synchronize internal information system clocks to an authoritative time source.

AUDIT AND ACCOUNTABILITY

ESXI-80-000145 - The ESXi host must enable bidirectional Challenge-Handshake Authentication Protocol (CHAP) authentication for Internet Small Computer Systems Interface (iSCSI) traffic.

IDENTIFICATION AND AUTHENTICATION

ESXI-80-000160 - The ESXi host must protect the confidentiality and integrity of transmitted information by isolating vMotion traffic.

SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-80-000189 - The ESXi host DCUI.Access list must be verified.

CONFIGURATION MANAGEMENT

ESXI-80-000191 - The ESXi host must display the Standard Mandatory DOD Notice and Consent Banner before granting access to the system via Secure Shell (SSH).

ACCESS CONTROL

ESXI-80-000193 - The ESXi host must be configured to disable nonessential capabilities by disabling Secure Shell (SSH).

ACCESS CONTROL, CONFIGURATION MANAGEMENT

ESXI-80-000194 - The ESXi host must be configured to disable nonessential capabilities by disabling the ESXi shell.

CONFIGURATION MANAGEMENT

ESXI-80-000195 - The ESXi host must automatically stop shell services after 10 minutes.

SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-80-000196 - The ESXi host must set a timeout to automatically end idle DCUI sessions after 10 minutes.

SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-80-000198 - The ESXi host must protect the confidentiality and integrity of transmitted information by isolating ESXi management traffic.

SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-80-000199 - The ESXi host must protect the confidentiality and integrity of transmitted information by isolating IP-based storage traffic.

SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-80-000201 - The ESXi host lockdown mode exception users list must be verified.

CONFIGURATION MANAGEMENT

ESXI-80-000213 - The ESXi host must disable Inter-Virtual Machine (VM) Transparent Page Sharing.

CONFIGURATION MANAGEMENT

ESXI-80-000214 - The ESXi host must configure the firewall to block network traffic by default.

CONFIGURATION MANAGEMENT

ESXI-80-000215 - The ESXi host must enable Bridge Protocol Data Units (BPDU) filter on the host to prevent being locked out of physical switch ports with Portfast and BPDU Guard enabled.

CONFIGURATION MANAGEMENT

ESXI-80-000216 - The ESXi host must configure virtual switch security policies to reject forged transmits.

CONFIGURATION MANAGEMENT

ESXI-80-000217 - The ESXi host must configure virtual switch security policies to reject Media Access Control (MAC) address changes.

CONFIGURATION MANAGEMENT

ESXI-80-000218 - The ESXi host must configure virtual switch security policies to reject promiscuous mode requests.

CONFIGURATION MANAGEMENT

ESXI-80-000219 - The ESXi host must restrict use of the dvFilter network application programming interface (API).

CONFIGURATION MANAGEMENT

ESXI-80-000220 - The ESXi host must restrict the use of Virtual Guest Tagging (VGT) on standard switches.

CONFIGURATION MANAGEMENT

ESXI-80-000221 - The ESXi host must have all security patches and updates installed.

CONFIGURATION MANAGEMENT

ESXI-80-000222 - The ESXi host must not suppress warnings that the local or remote shell sessions are enabled.

CONFIGURATION MANAGEMENT

ESXI-80-000223 - The ESXi host must not suppress warnings about unmitigated hyperthreading vulnerabilities.

CONFIGURATION MANAGEMENT

ESXI-80-000224 - The ESXi host must verify certificates for SSL syslog endpoints.

CONFIGURATION MANAGEMENT

ESXI-80-000225 - The ESXi host must enable volatile key destruction.

CONFIGURATION MANAGEMENT

ESXI-80-000226 - The ESXi host must configure a session timeout for the vSphere API.

CONFIGURATION MANAGEMENT

ESXI-80-000227 - The ESXi host must be configured with an appropriate maximum password age.

CONFIGURATION MANAGEMENT

ESXI-80-000228 - The ESXi Common Information Model (CIM) service must be disabled.

CONFIGURATION MANAGEMENT

ESXI-80-000231 - The ESXi host OpenSLP service must be disabled.

CONFIGURATION MANAGEMENT

ESXI-80-000232 - The ESXi host must enable audit logging.

CONFIGURATION MANAGEMENT

ESXI-80-000233 - The ESXi host must off-load audit records via syslog.

AUDIT AND ACCOUNTABILITY

ESXI-80-000234 - The ESXi host must enable strict x509 verification for SSL syslog endpoints.

CONFIGURATION MANAGEMENT

ESXI-80-000235 - The ESXi host must forward audit records containing information to establish what type of events occurred.

AUDIT AND ACCOUNTABILITY

ESXI-80-000239 - The ESXi host must configure the firewall to restrict access to services running on the host.

CONFIGURATION MANAGEMENT

ESXI-80-000240 - The ESXi host when using Host Profiles and/or Auto Deploy must use the vSphere Authentication Proxy to protect passwords when adding themselves to Active Directory.

CONFIGURATION MANAGEMENT

ESXI-80-000241 - The ESXi host must not use the default Active Directory ESX Admin group.

CONFIGURATION MANAGEMENT

ESXI-80-000243 - The ESXi host must configure a persistent log location for all locally stored logs.

AUDIT AND ACCOUNTABILITY