VCSA-70-000292 - The vCenter server configuration must be backed up on a regular basis.

Information

vCenter server is the control plane for the vSphere infrastructure and all the workloads it hosts. As such, vCenter is usually a highly critical system in its own right. Backups of vCenter can now be made at a data and configuration level versus traditional storage/image-based backups. This reduces recovery time by letting the system administrator (SA) spin up a new vCenter while simultaneously importing the backed-up data.

For sites that implement the Native Key Provider (NKP), introduced in 7.0 Update 2, regular vCenter backups are critical. In a recovery scenario where the virtual machine files are intact but vCenter was lost, the encrypted virtual machines will not be able to boot as their private keys were stored in vCenter after it was last backed up. When using the NKP, vCenter becomes critical to the virtual machine workloads and ceases to be just the control plane.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Option 1:

Implement and document a VMware-supported storage/image-based backup schedule.

Option 2:

To configure vCenter native backup functionality, open the VAMI by navigating to https://<vCenter server>:5480.

Log in with local operating system administrative credentials or with an SSO account that is a member of the 'SystemConfiguration.BashShellAdministrator' group.

Select 'Backup' on the left navigation pane.

On the resulting pane on the right, click 'Configure' (or 'Edit' for an existing configuration).

Enter site-specific information for the backup job.

Ensure 'Schedule' is set to 'Daily'. Limiting the number of retained backups is recommended but not required.

Click 'Create'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_7-0_Y24M01_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-256372r885727_rule, STIG-ID|VCSA-70-000292, Vuln-ID|V-256372

Plugin: VMware

Control ID: 627e3e1b2416f66eb11e21bc5e9af43fbdb9227001c4f32dc264652ab3bfeafa