ESXI-70-000095 - The ESXi host must implement Secure Boot enforcement.

Information

Secure Boot is part of the UEFI firmware standard. With UEFI Secure Boot enabled, a host refuses to load any UEFI driver or app unless the operating system bootloader has a valid digital signature. Secure Boot for ESXi requires support from the firmware and it requires that all ESXi kernel modules, drivers and VIBs be signed by VMware or a partner subordinate.

Secure Boot is enabled in the BIOS of the ESXi physical server and supported by the hypervisor boot loader. This control flips ESXi from merely supporting Secure Boot to requiring it. Without this setting enabled, and configuration encryption, an ESXi host could be subject to offline attacks. An attacker could simply transfer the ESXi install drive to a non-Secure Boot host and boot it up without ESXi complaining.

Note: This setting is only available in 7.0 Update 2 and later.

Satisfies: SRG-OS-000480-VMM-002000, SRG-OS-000257-VMM-000910, SRG-OS-000278-VMM-001000, SRG-OS-000446-VMM-001790

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

This setting cannot be configured until Secure Boot is properly enabled in the BIOS.

From an ESXi shell, run the following command:

# esxcli system settings encryption set --require-secure-boot=true

or

From a PowerCLI command prompt while connected to the ESXi host, run the following commands:

$esxcli = Get-EsxCli -v2
$arguments = $esxcli.system.settings.encryption.set.CreateArgs()
$arguments.requiresecureboot = $true
$esxcli.system.settings.encryption.set.Invoke($arguments)

Evacuate the host and gracefully reboot for changes to take effect.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_7-0_Y23M07_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

References: 800-53|AU-9, 800-53|AU-9(3), 800-53|SI-6b., CAT|II, CCI|CCI-001494, CCI|CCI-001496, CCI|CCI-002699, Rule-ID|SV-256447r886122_rule, STIG-ID|ESXI-70-000095, Vuln-ID|V-256447

Plugin: Unix

Control ID: ad8138fbbaab6bfaabb3f703cea4771352f673f3e3fa65ba14e89d06b6411709