ESXI5-VM-000013 - The system must disable VM Monitor Control during normal operation

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

When virtual machines are running on a hypervisor they are aware that they are running in a virtual environment and this information is available to tools inside the guest OS. This can give attackers information about the platform that they are running on that they may not get from a normal physical server. This option completely disables all hooks for a virtual machine and the guest OS will not be aware that it is running in a virtual environment at all. This feature may be enabled for short term diagnostics and troubleshooting, but must be disabled prior to resumption of normal operations.

Solution

As root, log in to the ESXi host and locate the VM's vmx file.
find / | grep vmx

Add the following to the VM's vmx file.
keyword = 'keyval'

Where:
keyword = isolation.monitor.control.disable
keyval = TRUE

See Also

http://iasecontent.disa.mil/stigs/zip/U_ESXi5_Virtual_Machine_V1R7_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-7, CAT|II, CCI|CCI-000366, Group-ID|V-39454, Rule-ID|SV-51312r1_rule, STIG-ID|ESXI5-VM-000013, Vuln-ID|V-39454

Plugin: VMware

Control ID: 72a037e6ea31ef7064e62d9de1776d9a4baceee8ad9341e54c61bcfbe2234477