8.4.1 Control access to VMs through the dvfilter network APIs

Information

Configure VMs protected by dvfilter network APIs correctly.

*Rationale*

A VM must be configured explicitly to accept access by the dvfilter network API. This
should be done only for VMs for which you want this to be done. An attacker might
compromise the VM by making use of this introspection channel.

Solution

If a VM is supposed to be protected-. Configure the following in its VMX file- ethernet0.filter1.name = dv-
filter1 where ethernet0 is the network adapter interface of the virtual machine
that is to be protected, filter1 is the number of the filter that is being used, and dv-
filter1 is the name of the particular data path kernel module that is protecting the
VM.
. Ensure that the name of the data path kernel is set correctly.If a VM is not supposed to be protected-. Remove the following from its VMX file- ethernet0.filter1.name = dv-
filter1 where ethernet0 is the network adapter interface of the virtual machine
that is to be protected, filter1 is the number of the filter that is being used, and dv-
filter1 is the name of the particular data path kernel module that is protecting the
VM.

Impact-Incorrectly configuring this option can negatively impact functionality of tools that use
vmsafe API.Incorrectly configuring this option can prevent VMs from connecting to the network.

Default Value-The prescribed state is the default state.

See Also

https://workbench.cisecurity.org/files/902

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-3

Plugin: VMware

Control ID: 5c1c543835babf5eadc3a6ed19e3cec21ec1049d5391ba032001af2f7fd97abc