2.4 Do not use default self-signed certificates for ESXi communication

Information

The default certificates are not signed by a commercial certificate authority (CA). These
default x.509 certificates should be replaced with those issued by a trusted CA.

*Rationale*

Using the default self-signed certificates may increase risk related to Man-in-The-Middle
(MiTM) attacks. Replace default self-signed certificates with those from a trusted CA, either
commercial or organizational.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Leverage VMware's SSL Certificate Automation Tool to install CA-signed SSL certificates. Fore more information on this tool, please see http-//kb.vmware.com/kb/2041600.

Default Value-The prescribed state is not the default state.

See Also

https://workbench.cisecurity.org/files/902