VCSA-70-000277 - The vCenter Server must be isolated from the public internet but must still allow for patch notification and delivery.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

vCenter and the embedded Lifecycle Manager system must never have a direct route to the internet. Despite this, updates and patches sourced from VMware on the internet must be delivered in a timely manner.

There are two methods to accomplish this: a proxy server and the Update Manager Download Service (UMDS). UMDS is an optional module for Lifecycle Manager that fetches upgrades for virtual appliances, patch metadata, patch binaries, and notifications that would not otherwise be available to an isolated Lifecycle Manager directly.

Alternatively, a proxy for Lifecycle Manager can be configured to allow controlled, limited access to the public internet for the sole purpose of patch gathering. Either solution mitigates the risk of internet connectivity by limiting its scope and use.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Option 1:

From the vSphere Client, go to Lifecycle Manager >> Settings >> Patch Setup.

Click the 'Change Download Source' button.

Select the 'Download patches from a UMDS shared repository' radio button and supply a valid UMDS repository.

Click 'Save'.

Option 2:

From the vSphere Client, go to Lifecycle Manager >> Settings >> Patch Setup.

Click the 'Change Download Source' button.

Select the 'Download patches directly from the internet' radio button.

Click 'Save'.

Navigate to the vCenter Server Management interface at https://<vcenter dns>:5480 >> Networking >> Proxy Settings.

Click 'Edit'.

Slide 'HTTPS' to 'Enabled'.

Supply the appropriate proxy server configuration.

Click 'Save'.

Option 3:

From the vSphere Client, go to Lifecycle Manager >> Settings >> Patch Downloads.

Click 'Edit' and uncheck 'Download patches'.

Under 'Patch Setup', select each download source and click 'Disable'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_7-0_Y23M07_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000366, Rule-ID|SV-256357r885682_rule, STIG-ID|VCSA-70-000277, Vuln-ID|V-256357

Plugin: VMware

Control ID: 208cb29109c7c187bacd22a7cd0bddc77f19cb8ed180066c49fffe0c2c9585ef