ESXI-65-000047 - The ESXi Image Profile and VIB Acceptance Levels must be verified.

Information

Verify the ESXi Image Profile to only allow signed VIBs. An unsigned VIB represents untested code installed on an ESXi host. The ESXi Image profile supports four acceptance levels:

(1) VMwareCertified - VIBs created, tested and signed by VMware
(2) VMwareAccepted - VIBs created by a VMware partner but tested and signed by VMware,
(3) PartnerSupported - VIBs created, tested and signed by a certified VMware partner
(4) CommunitySupported - VIBs that have not been tested by VMware or a VMware partner.

Community Supported VIBs are not supported and do not have a digital signature. To protect the security and integrity of your ESXi hosts do not allow unsigned (CommunitySupported) VIBs to be installed on your hosts.

Solution

From the vSphere Web Client select the ESXi Host and go to Configure >> System >> Security Profile. Under 'Host Image Profile Acceptance Level' click Edit... and use the pull-down selection, set the acceptance level to be VMwareCertified, VMwareAccepted, or PartnerSupported.

or

From a PowerCLI command prompt while connected to the ESXi host run the following commands:

$esxcli = Get-EsxCli
$esxcli.software.acceptance.Set('PartnerSupported')

Note: VMwareCertified or VMwareAccepted may be substituted for PartnerSupported, depending upon local requirements.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-5_Y21M07_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-7(5), CAT|I, CCI|CCI-001749, Rule-ID|SV-207648r379825_rule, STIG-ID|ESXI-65-000047, STIG-Legacy|SV-104127, STIG-Legacy|V-94041, Vuln-ID|V-207648

Plugin: Unix

Control ID: 9cf58d766488670bf2cf9dfb76b8003086a456c78583b87e697aca6ee3bf18c5