VCTR-67-000065 - The vCenter Server must have Mutual CHAP configured for vSAN iSCSI targets.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

When Mutual CHAP is enabled, vSphere performs bidirectional authentication of both the iSCSI target and host. There is a potential for a MitM attack when not authenticating both the iSCSI target and host in which an attacker might impersonate either side of the connection to steal data. Bidirectional authentication mitigates this risk.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

From the vSphere Client, go to Hosts and Clusters >> select a vSAN Enabled Cluster >> Configure >> vSAN >> iSCSI Target Service.

For each iSCSI target, select the item and click 'Edit'.

Change the 'Authentication' field to 'Mutual CHAP' and configure the incoming and outgoing users and secrets appropriately.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-7_Y22M04_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000366, Rule-ID|SV-243120r719603_rule, STIG-ID|VCTR-67-000065, Vuln-ID|V-243120

Plugin: VMware

Control ID: 4a7fa0e0ff606ceca25c514af4a200c9e4e994217819470f86668316e57ef9e4