1.2 Ensure the Image Profile VIB acceptance level is configured properly

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

A VIB (vSphere Installation Bundle) is a collection of files that are packaged into an archive. The VIB contains a signature file that is used to verify the level of trust. The ESXi Image Profile supports four VIB acceptance levels:

VMware Certified - VIBs created, tested, and signed by VMware

VMware Accepted - VIBs created by a VMware partner but tested and signed by VMware

Partner Supported - VIBs created, tested, and signed by a certified VMware partner

Community Supported - VIBs that have not been tested by VMware or a VMware partner

Rationale:

The ESXi Image Profile should only allow signed VIBs because an unsigned VIB represents untested code installed on an ESXi host. Also, use of unsigned VIBs will cause hypervisor Secure Boot to fail to configure. Community Supported VIBs do not have digital signatures. To protect the security and integrity of your ESXi hosts, do not allow unsigned (CommunitySupported) VIBs to be installed on your hosts.

Impact:

Unsigned (Community Supported) VIBs will not be able to be utilized on a host.

Solution

To verify the host image profile acceptance level perform the following:

From the vSphere Web Client, select the host.

Click Configure, then under System select Security Profile.

Under Host Image Profile Acceptance Level select Edit

In the dropdown select one of the following - VMware Certified, VMware Accepted, or Partner Supported.

To implement the recommended configuration state, run the following PowerCLI command (in the example code, the level is Partner Supported):

# Set the Software AcceptanceLevel for each host<span>
Foreach ($VMHost in Get-VMHost ) {
$ESXCli = Get-EsxCli -VMHost $VMHost
$ESXCli.software.acceptance.Set('PartnerSupported')
}

Default Value:

Partner Supported

See Also

https://workbench.cisecurity.org/files/3473