VCSA-80-000304 The vCenter Server must enable data in transit encryption for vSAN.

Information

Transit encryption must be enabled to prevent unauthorized disclosure information and to protect the confidentiality of organizational information.

vSAN data-in-transit encryption has the following characteristics:
-vSAN uses AES-256 bit encryption on data in transit.
-Forward secrecy is enforced for vSAN data-in-transit encryption.
-Traffic between data hosts and witness hosts is encrypted.
-File service data traffic between the VDFS proxy and VDFS server is encrypted.
-vSAN file services inter-host connections are encrypted.
-vSAN uses symmetric keys that are generated dynamically and shared between hosts. Hosts dynamically generate an encryption key when they establish a connection, and they use the key to encrypt all traffic between the hosts. You do not need a key management server to perform data-in-transit encryption.

Each host is authenticated when it joins the cluster, ensuring connections only to trusted hosts are allowed. When a host is removed from the cluster, it is authentication certificate is removed.

vSAN data-in-transit encryption is a cluster-wide setting. When enabled, all data and metadata traffic is encrypted as it transits across hosts.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

From the vSphere Client, go to Host and Clusters.

Select the vCenter Server >> Select the target cluster >> Configure >> vSAN >> Services >> Data Services.

Click "Edit".

Enable "Data-In-Transit encryption" and choose a rekey interval suitable for the environment then click "Apply".

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_8-0_Y24M08_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-258969r961863_rule, STIG-ID|VCSA-80-000304, Vuln-ID|V-258969

Plugin: VMware

Control ID: c536b6ade294be559d0f4b1cb537046270311fc18da494328e83da0b07c0399a