CIS VMware ESXi 5.1 v1.0.1 Level 1

Audit Details

Name: CIS VMware ESXi 5.1 v1.0.1 Level 1

Updated: 7/24/2023

Authority: CIS

Plugin: VMware

Revision: 1.17

Estimated Item Count: 74

File Details

Filename: CIS_VMware_ESXi_5.1_v1.0.1_L1.audit

Size: 232 kB

MD5: 8c1e345560e4931c22357993d24255b1
SHA256: 85f0fdcdac761ff1de0839e474d214e31ffe92309af9e06fa2b6f5897ba424ab

Audit Items

DescriptionCategories
1.1 Keep ESXi system properly patched

SYSTEM AND INFORMATION INTEGRITY

1.2 Verify Image Profile and VIB Acceptance Levels

SYSTEM AND SERVICES ACQUISITION

1.3 Verify no unauthorized kernel modules are loaded on the host

SYSTEM AND SERVICES ACQUISITION

1.4 Ensure that the Forged Transmits policy is set to reject

SYSTEM AND COMMUNICATIONS PROTECTION

1.5 Ensure that VDS Netflow traffic is only being sent to authorized collector IP Addresses

SYSTEM AND SERVICES ACQUISITION

1.6 Restrict port-level configuration overrides on vDS

SYSTEM AND SERVICES ACQUISITION

2.1 Configure NTP time synchronization

AUDIT AND ACCOUNTABILITY

2.2 Configure the ESXi host firewall to restrict access to services running on the host

ACCESS CONTROL

2.3 Disable Managed Object Browser (MOB)

ACCESS CONTROL, MEDIA PROTECTION

2.4 Do not use default self-signed certificates for ESXi communication

SYSTEM AND COMMUNICATIONS PROTECTION

2.6 Ensure proper SNMP configuration- 'community name private does not exist'

IDENTIFICATION AND AUTHENTICATION

2.6 Ensure proper SNMP configuration- 'community name public does not exist'

IDENTIFICATION AND AUTHENTICATION

2.7 Prevent unintended use of dvfilter network APIs

ACCESS CONTROL

2.8 When adding ESXi hosts to Active Directory use the vSphere Authentication Proxy to protect passwords

ACCESS CONTROL

3.1 Configure a centralized location to collect ESXi host core dumps

CONFIGURATION MANAGEMENT

3.2 Configure Host Profiles to monitor and alert on configuration changes

CONFIGURATION MANAGEMENT

3.3 Configure persistent logging for all ESXi host

AUDIT AND ACCOUNTABILITY

3.4 Configure remote logging for ESXi hosts

AUDIT AND ACCOUNTABILITY

4.1 Create a non-root user account for local admin access

CONFIGURATION MANAGEMENT

4.2 Ensure the vpxuser account's password is automatically changed every 10 or fewer days

IDENTIFICATION AND AUTHENTICATION

4.3 Establish a password policy for password complexity

IDENTIFICATION AND AUTHENTICATION

4.4 Use Active Directory for local user authentication - Enabled = 'true'

IDENTIFICATION AND AUTHENTICATION

4.4 Use Active Directory for local user authentication - Review Domain

IDENTIFICATION AND AUTHENTICATION

4.5 Verify Active Directory group membership for the 'ESX Admins' group

ACCESS CONTROL

5.2 Disable ESXi Shell unless needed for diagnostics or troubleshooting

CONFIGURATION MANAGEMENT

5.3 Disable SSH

CONFIGURATION MANAGEMENT

5.4 Enable lockdown mode to restrict remote access

CONFIGURATION MANAGEMENT

5.5 Remove keys from SSH authorized_keys file

ACCESS CONTROL

5.6 Set a timeout to automatically terminate idle ESXi Shell and SSH sessions

ACCESS CONTROL

5.8 Set DCUI.Access to allow trusted users to override lockdown mode

ACCESS CONTROL

6.1 Enable bidirectional CHAP authentication for iSCSI traffic

IDENTIFICATION AND AUTHENTICATION

6.2 Ensure uniqueness of CHAP authentication secrets

IDENTIFICATION AND AUTHENTICATION

7.1.1 Disable VDS network healthcheck if not used

ACCESS CONTROL

7.1.2 Ensure that the MAC Address Change policy is set to reject

SYSTEM AND COMMUNICATIONS PROTECTION

7.1.3 Ensure that the Promiscuous Mode policy is set to reject

SYSTEM AND COMMUNICATIONS PROTECTION

7.1.4 Ensure that there are no unused ports on a distributed virtual port group

CONFIGURATION MANAGEMENT

7.1.5 Ensure that VDS Port Mirror traffic is only being sent to authorized collector ports or VLANs

AUDIT AND ACCOUNTABILITY

7.1.6 Verify that the autoexpand option for VDS dvPortgroups is disabled

CONFIGURATION MANAGEMENT

7.2.1 Ensure that port groups are not configured to the value of the native VLAN

SYSTEM AND INFORMATION INTEGRITY

7.2.2 Ensure that port groups are not configured to VLAN 4095 except for Virtual Guest Tagging (VGT)

CONFIGURATION MANAGEMENT

7.2.3 Ensure that port groups are not configured to VLAN values reserved by upstream physical switches

SECURITY ASSESSMENT AND AUTHORIZATION

7.3.1 Ensure that the vSwitch Forged Transmits policy is set to reject

SYSTEM AND COMMUNICATIONS PROTECTION

7.3.2 Ensure that the vSwitch MAC Address Change policy is set to reject

SYSTEM AND COMMUNICATIONS PROTECTION

7.3.3 Ensure that the vSwitch Promiscuous Mode policy is set to reject

SYSTEM AND COMMUNICATIONS PROTECTION

8.1.1 Disable VM communication through VMCI

SYSTEM AND COMMUNICATIONS PROTECTION

8.1.2 Limit informational messages from the VM to the VMX file

AUDIT AND ACCOUNTABILITY

8.1.3 Limit sharing of console connections

ACCESS CONTROL

8.2.1 Disconnect unauthorized devices - Floppy Devices

MEDIA PROTECTION

8.2.2 Disconnect unauthorized devices - CD/DVD Devices
8.2.3 Disconnect unauthorized devices - Parallel Devices

CONFIGURATION MANAGEMENT