DISA STIG VMware vSphere 7.0 ESXi OS v1r2

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: DISA STIG VMware vSphere 7.0 ESXi OS v1r2

Updated: 4/3/2025

Authority: DISA STIG

Plugin: Unix

Revision: 1.2

Estimated Item Count: 28

Audit Items

DescriptionCategories
DISA_STIG_VMware_vSphere_7.0_ESXi_Bare_Metal_Host_v1r2.audit from DISA VMware vSphere 7.0 ESXi v1r2 STIG
ESXI-70-000009 - The ESXi host SSH daemon must be configured with the DOD logon banner - DoD login banner.
ESXI-70-000010 - The ESXi host Secure Shell (SSH) daemon must use FIPS 140-2 validated cryptographic modules to protect the confidentiality of remote access sessions.
ESXI-70-000012 - The ESXi host Secure Shell (SSH) daemon must ignore '.rhosts' files.
ESXI-70-000013 - The ESXi host Secure Shell (SSH) daemon must not allow host-based authentication.
ESXI-70-000015 - The ESXi host Secure Shell (SSH) daemon must not allow authentication using an empty password.
ESXI-70-000016 - The ESXi host Secure Shell (SSH) daemon must not permit user environment settings.
ESXI-70-000020 - The ESXi host Secure Shell (SSH) daemon must perform strict mode checking of home directory configuration files.
ESXI-70-000021 - The ESXi host Secure Shell (SSH) daemon must not allow compression or must only allow compression after successful authentication.
ESXI-70-000022 - The ESXi host Secure Shell (SSH) daemon must be configured to not allow gateway ports.
ESXI-70-000023 - The ESXi host Secure Shell (SSH) daemon must be configured to not allow X11 forwarding.
ESXI-70-000025 - The ESXi host Secure Shell (SSH) daemon must not permit tunnels.
ESXI-70-000026 - The ESXi host Secure Shell (SSH) daemon must set a timeout count on idle sessions.
ESXI-70-000027 - The ESXi host Secure Shell (SSH) daemon must set a timeout interval on idle sessions.
ESXI-70-000047 - The ESXi Image Profile and vSphere Installation Bundle (VIB) acceptance levels must be verified - VIB Acceptance Levels must be verified.
ESXI-70-000056 - The ESXi host must configure the firewall to restrict access to services running on the host.
ESXI-70-000076 - The ESXi host must enable Secure Boot.
ESXI-70-000078 - The ESXi host must use DOD-approved certificates.
ESXI-70-000082 - The ESXi host Secure Shell (SSH) daemon must disable port forwarding.
ESXI-70-000083 - The ESXi host OpenSLP service must be disabled.
ESXI-70-000084 - The ESXi host must enable audit logging.
ESXI-70-000085 - The ESXi host must enable strict x509 verification for SSL syslog endpoints.
ESXI-70-000090 - The ESXi host rhttpproxy daemon must use FIPS 140-2 validated cryptographic modules to protect the confidentiality of remote access sessions.
ESXI-70-000092 - The ESXi host must not be configured to override virtual machine (VM) configurations.
ESXI-70-000093 - The ESXi host must not be configured to override virtual machine (VM) logger settings.
ESXI-70-000094 - The ESXi host must require TPM-based configuration encryption.
ESXI-70-000095 - The ESXi host must implement Secure Boot enforcement.
ESXI-70-000274 - The ESXi host SSH daemon must be configured to only use FIPS 140-2 validated ciphers.