8.4.3 Ensure VMsafe Agent Port is configured correctly

Information

The VMsafe CPU/memory API allows a security virtual machine to inspect and modify the contents of the memory and CPU registers on other VMs, for the purpose of detecting and preventing malware attacks. A VM must be configured explicitly to accept access by the VMsafe CPU/memory API. This involves three parameters to perform the following:

Enable the API.

Set the IP address used by the security virtual appliance on the introspection vSwitch.

Set the port number for that IP address.

The third parameter must be set correctly in the vmsafe.agentPort option in the virtual machine configuration file for any VMs that should be protected by the API.

Rationale:

An attacker might compromise the VMs by making unauthorized use of the introspection channel provided by the API.

Solution

To configure the VMsafe Agent Port correctly, perform the following steps:

If the VM is not being protected by a VMsafe CPU/memory product, remove vmsafe.agentPort from the virtual machine configuration file.

If the VM is being protected by a VMsafe CPU/Memory product, set vmsafe.agentPort to the correct value.

References:

http://kb.vmware.com/kb/1714

https://www.vmware.com/security/hardening-guides.html

See Also

https://workbench.cisecurity.org/files/2816

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-3(10), CSCv7|9.2

Plugin: VMware

Control ID: 2200f2dfbfb1a4795685800f4129e59231a07d351bcbbd41cd19d7fe6153bf28