2.11 (L1) Host must use sufficient entropy for cryptographic operations

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Starting with vSphere 8.0, ESXi has enhanced its entropy implementation to align with FIPS 140-3 and EAL4 certifications, ensuring a robust foundation for cryptographic operations. Kernel boot options dictate the activation of entropy sources on an ESXi host. The parameter governing this behavior is disableHwrng = FALSE and entropySources = 0.

Employing adequate entropy is crucial for ensuring the strength of cryptographic operations.

Solution

Impact:

There is no functional impact noted.

See Also

https://workbench.cisecurity.org/benchmarks/15784