VCSA-80-000009 The vCenter Server must use DOD-approved encryption to protect the confidentiality of network sessions.

Information

Using older unauthorized versions or incorrectly configuring protocol negotiation makes the gateway vulnerable to known and unknown attacks that exploit vulnerabilities in this protocol.

In vCenter 8 Update 3, Transport Layer Security (TLS) Profiles were introduced that allow users to manage and configure TLS parameters for the vCenter server. Several TLS profiles are available by default but not all may be suitable for high security environments.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

From the vSphere Client, go to Developer Center >> API Explorer.

Select "appliance" from the "Select API" drop down list then scroll down to the "tls/profiles/global" section.

Expand the PUT call and enter the following in the value box:

{
"profile": "NIST_2024"
}

Click Execute and Continue to configure a new global TLS profile.

or

From a PowerCLI command prompt while connected to the vCenter server, run the following command:

Invoke-SetProfilesGlobalAsync -TlsProfilesGlobalSetSpec (Initialize-TlsProfilesGlobalSetSpec -VarProfile NIST_2024)

To monitor the status of the operation the task id from the command output can be used with the "Invoke-GetTask" command. For example:

Invoke-GetTask -Task 66b247c2-fe02-4425-9338-1c88eb856138:com.vmware.appliance.tls.profiles.global

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_8-0_Y24M08_STIG.zip

Item Details

Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|AC-17(2), 800-53|CM-7b., 800-53|IA-2(8), 800-53|SC-8, 800-53|SC-8(1), 800-53|SC-8(2), 800-53|SC-13, 800-53|SC-23, CAT|II, CCI|CCI-000068, CCI|CCI-000382, CCI|CCI-001184, CCI|CCI-001453, CCI|CCI-001941, CCI|CCI-002418, CCI|CCI-002420, CCI|CCI-002421, CCI|CCI-002422, CCI|CCI-002450, Rule-ID|SV-265978r1003613_rule, STIG-ID|VCSA-80-000009, Vuln-ID|V-265978

Plugin: VMware

Control ID: 77a48f6bd93908ba8c0f5e48efde77b404518b59df02ff4ff9ae93825b9fca9e