CIS VMware ESXi 7.0 v1.3.0 Level 1

Audit Details

Name: CIS VMware ESXi 7.0 v1.3.0 Level 1

Updated: 2/7/2024

Authority: CIS

Plugin: VMware

Revision: 1.0

Estimated Item Count: 54

File Details

Filename: CIS_VMware_ESXi_7.0_v1.3.0_L1.audit

Size: 200 kB

MD5: 5f9e39b35e9e9b30b6461ccbc41e3464
SHA256: 65b9684beba13fca3ae47bab2a9b9e7daba0fc91429e7e4da027628236f36b08

Audit Items

DescriptionCategories
1.1 Ensure ESXi is properly patched

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

2.1 Ensure NTP time synchronization is configured properly

AUDIT AND ACCOUNTABILITY

2.2 Ensure the ESXi host firewall is configured to restrict access to services running on the host

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.3 Ensure Managed Object Browser (MOB) is disabled

ACCESS CONTROL, MEDIA PROTECTION

2.5 Ensure SNMP is configured properly - 'community name private does not exist'

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

2.5 Ensure SNMP is configured properly - 'community name public does not exist'

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

2.6 Ensure dvfilter API is not configured if not used

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

2.8 Ensure vSphere Authentication Proxy is used when adding hosts to Active Directory

ACCESS CONTROL

3.2 Ensure persistent logging is configured for all ESXi hosts

AUDIT AND ACCOUNTABILITY

3.3 Ensure remote logging is configured for ESXi hosts

AUDIT AND ACCOUNTABILITY

4.2 Ensure passwords are required to be complex

IDENTIFICATION AND AUTHENTICATION

4.3 Ensure the maximum failed login attempts is set to 5

ACCESS CONTROL

4.4 Ensure account lockout is set to 15 minutes

ACCESS CONTROL

4.5 Ensure previous 5 passwords are prohibited

IDENTIFICATION AND AUTHENTICATION

4.7 Ensure only authorized users and groups belong to the esxAdminsGroup group

ACCESS CONTROL

4.8 Ensure the Exception Users list is properly configured

ACCESS CONTROL, MEDIA PROTECTION

5.1 Ensure the DCUI timeout is set to 600 seconds or less

ACCESS CONTROL

5.2 Ensure the ESXi shell is disabled

CONFIGURATION MANAGEMENT

5.3 Ensure SSH is disabled

CONFIGURATION MANAGEMENT

5.4 Ensure CIM access is limited

CONFIGURATION MANAGEMENT

5.5 Ensure Normal Lockdown mode is enabled

ACCESS CONTROL

5.8 Ensure idle ESXi shell and SSH sessions time out after 300 seconds or less

ACCESS CONTROL

5.9 Ensure the shell services timeout is set to 1 hour or less

ACCESS CONTROL

5.10 Ensure DCUI has a trusted users list for lockdown mode

ACCESS CONTROL

6.1 Ensure bidirectional CHAP authentication for iSCSI traffic is enabled

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.3 Ensure storage area network (SAN) resources are segregated properly

SYSTEM AND COMMUNICATIONS PROTECTION

7.1 Ensure the vSwitch Forged Transmits policy is set to reject

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.2 Ensure the vSwitch MAC Address Change policy is set to reject

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.3 Ensure the vSwitch Promiscuous Mode policy is set to reject

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.4 Ensure port groups are not configured to the value of the native VLAN

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.5 Ensure port groups are not configured to VLAN values reserved by upstream physical switches

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.6 Ensure port groups are not configured to VLAN 4095 and 0 except for Virtual Guest Tagging (VGT)

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.7 Ensure Virtual Distributed Switch Netflow traffic is sent to an authorized collector

SYSTEM AND INFORMATION INTEGRITY

7.8 Ensure port-level configuration overrides are disabled.

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

8.2.1 Ensure unnecessary floppy devices are disconnected

CONFIGURATION MANAGEMENT

8.2.3 Ensure unnecessary parallel ports are disconnected

CONFIGURATION MANAGEMENT

8.2.4 Ensure unnecessary serial ports are disconnected

CONFIGURATION MANAGEMENT

8.2.5 Ensure unnecessary USB devices are disconnected

CONFIGURATION MANAGEMENT

8.2.6 Ensure unauthorized modification and disconnection of devices is disabled

CONFIGURATION MANAGEMENT

8.2.7 Ensure unauthorized connection of devices is disabled

CONFIGURATION MANAGEMENT

8.2.8 Ensure PCI and PCIe device passthrough is disabled

CONFIGURATION MANAGEMENT

8.3.1 Ensure unnecessary or superfluous functions inside VMs are disabled

CONFIGURATION MANAGEMENT

8.3.2 Ensure use of the VM console is limited

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

8.3.3 Ensure secure protocols are used for virtual serial port access

CONFIGURATION MANAGEMENT, MAINTENANCE

8.3.4 Ensure standard processes are used for VM deployment

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

8.4.1 Ensure access to VMs through the dvfilter network APIs is configured correctly

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

8.4.21 Ensure VM Console Copy operations are disabled

CONFIGURATION MANAGEMENT

8.4.22 Ensure VM Console Drag and Drop operations is disabled

CONFIGURATION MANAGEMENT

8.4.23 Ensure VM Console GUI Options is disabled

CONFIGURATION MANAGEMENT

8.4.24 Ensure VM Console Paste operations are disabled

CONFIGURATION MANAGEMENT