8.4.2 Ensure VMsafe Agent Address is configured correctly

Information

The VMsafe CPU/memory API allows a security virtual machine to inspect and modify the contents of the memory and CPU registers on other VMs, for the purpose of detecting and preventing malware attacks. A VM must be configured explicitly to accept access by the VMsafe CPU/memory API. This involves three parameters to perform the following:

Enable the API.

Set the IP address used by the security virtual appliance on the introspection vSwitch.

Set the port number for that IP address.

The second parameter must be set correctly in the vmsafe.agentAddress option in the virtual machine configuration file for any VMs that should be protected by the API.

Rationale:

An attacker might compromise the VMs by making unauthorized use of the introspection channel provided by the API.

Solution

To configure the VMsafe Agent Address correctly, perform the following steps:

If the VM is not being protected by a VMsafe CPU/memory product, remove vmsafe.agentAddress from the virtual machine configuration file.

If the VM is being protected by a VMsafe CPU/Memory product, set vmsafe.agentAddress to the correct value.

References:

http://kb.vmware.com/kb/1714

https://www.vmware.com/security/hardening-guides.html

Notes:

With vSphere 4 VMware came out with a restricted API called 'VMsafe' which offered a CPU and Memory introspection API. This was a restricted API that was only available to VMware partners.

For vSphere 5.5 onward, this VMsafe API is no longer supported.

See Also

https://workbench.cisecurity.org/files/2816

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-3(10), CSCv7|8.3

Plugin: VMware

Control ID: 34d6e1fc6ee15c8d87ae6b0e8ad7b081eb2409077bcc1fc3c03b603298058824