STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to STIGs

VMware vSphere 7.0 vCenter Security Technical Implementation Guide

Version

V1R3

Release Date

Dec 21, 2023

SCAP Benchmark ID

VMW_vSphere_7-0_vCenter_STIG

Total Checks

57

Tags

vmware
CAT I: 2CAT II: 53CAT III: 2

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Export CKLExport CSVExport JSONDownload STIG ZIP

Checks (57)

V-256318HIGHThe vCenter Server must use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data during electronic dissemination using remote access.V-256319MEDIUMThe vCenter Server must enforce the limit of three consecutive invalid login attempts by a user.V-256320MEDIUMThe vCenter Server must display the Standard Mandatory DOD Notice and Consent Banner before login.V-256321MEDIUMThe vCenter Server must produce audit records containing information to establish what type of events occurred.V-256322MEDIUMvCenter Server plugins must be verified.V-256323MEDIUMThe vCenter Server must uniquely identify and authenticate users or processes acting on behalf of users.V-256324MEDIUMThe vCenter Server must require multifactor authentication.V-256325MEDIUMThe vCenter Server passwords must be at least 15 characters in length.V-256326MEDIUMThe vCenter Server must prohibit password reuse for a minimum of five generations.V-256327MEDIUMThe vCenter Server passwords must contain at least one uppercase character.V-256328MEDIUMThe vCenter Server passwords must contain at least one lowercase character.V-256329MEDIUMThe vCenter Server passwords must contain at least one numeric character.V-256330MEDIUMThe vCenter Server passwords must contain at least one special character.V-256331HIGHThe vCenter Server must enable FIPS-validated cryptography.V-256332MEDIUMThe vCenter Server must enforce a 60-day maximum password lifetime restriction.V-256333MEDIUMThe vCenter Server must enable revocation checking for certificate-based authentication.V-256334MEDIUMThe vCenter Server must terminate vSphere Client sessions after 10 minutes of inactivity.V-256335MEDIUMThe vCenter Server users must have the correct roles assigned.V-256336MEDIUMThe vCenter Server must manage excess capacity, bandwidth, or other redundancy to limit the effects of information flooding types of denial-of-service (DoS) attacks by enabling Network I/O Control (NIOC).V-256337MEDIUMThe vCenter Server must provide an immediate real-time alert to the system administrator (SA) and information system security officer (ISSO), at a minimum, on every Single Sign-On (SSO) account action.V-256338MEDIUMThe vCenter Server must set the interval for counting failed login attempts to at least 15 minutes.V-256339MEDIUMThe vCenter Server must be configured to send logs to a central log server.V-256340MEDIUMvCenter must provide an immediate real-time alert to the system administrator (SA) and information system security officer (ISSO), at a minimum, of all audit failure events requiring real-time alerts.V-256341MEDIUMThe vCenter Server must compare internal information system clocks at least every 24 hours with an authoritative time server.V-256342MEDIUMThe vCenter Server Machine Secure Sockets Layer (SSL) certificate must be issued by a DOD certificate authority.V-256343MEDIUMThe vCenter Server must disable the Customer Experience Improvement Program (CEIP).V-256344MEDIUMThe vCenter server must enforce SNMPv3 security features where SNMP is required.V-256345MEDIUMThe vCenter server must disable SNMPv1/2 receivers.V-256346MEDIUMThe vCenter Server must require an administrator to unlock an account locked due to excessive login failures.V-256347LOWThe vCenter Server must disable the distributed virtual switch health check.V-256348MEDIUMThe vCenter Server must set the distributed port group Forged Transmits policy to "Reject".V-256349MEDIUMThe vCenter Server must set the distributed port group Media Access Control (MAC) Address Change policy to "Reject".V-256350MEDIUMThe vCenter Server must set the distributed port group Promiscuous Mode policy to "Reject".V-256351MEDIUMThe vCenter Server must only send NetFlow traffic to authorized collectors.V-256352MEDIUMThe vCenter Server must configure all port groups to a value other than that of the native virtual local area network (VLAN).V-256353MEDIUMThe vCenter Server must not configure VLAN Trunking unless Virtual Guest Tagging (VGT) is required and authorized.V-256354MEDIUMThe vCenter Server must not configure all port groups to virtual local area network (VLAN) values reserved by upstream physical switches.V-256355MEDIUMThe vCenter Server must configure the "vpxuser" auto-password to be changed every 30 days.V-256356MEDIUMThe vCenter Server must configure the "vpxuser" password to meet length policy.V-256357MEDIUMThe vCenter Server must be isolated from the public internet but must still allow for patch notification and delivery.V-256358MEDIUMThe vCenter Server must use unique service accounts when applications connect to vCenter.V-256359MEDIUMThe vCenter Server must protect the confidentiality and integrity of transmitted information by isolating Internet Protocol (IP)-based storage traffic.V-256360MEDIUMThe vCenter server must be configured to send events to a central log server.V-256361MEDIUMThe vCenter Server must disable or restrict the connectivity between vSAN Health Check and public Hardware Compatibility List (HCL) by use of an external proxy server.V-256362MEDIUMThe vCenter Server must configure the vSAN Datastore name to a unique name.V-256363LOWThe vCenter Server must disable Username/Password and Windows Integrated Authentication.V-256364MEDIUMThe vCenter Server must restrict access to the default roles with cryptographic permissions.V-256365MEDIUMThe vCenter Server must restrict access to cryptographic permissions.V-256366MEDIUMThe vCenter Server must have Mutual Challenge Handshake Authentication Protocol (CHAP) configured for vSAN Internet Small Computer System Interface (iSCSI) targets.V-256367MEDIUMThe vCenter Server must have new Key Encryption Keys (KEKs) reissued at regular intervals for vSAN encrypted datastore(s).V-256368MEDIUMThe vCenter Server must use secure Lightweight Directory Access Protocol (LDAPS) when adding an LDAP identity source.V-256369MEDIUMThe vCenter Server must use a limited privilege account when adding a Lightweight Directory Access Protocol (LDAP) identity source.V-256370MEDIUMThe vCenter Server must limit membership to the "SystemConfiguration.BashShellAdministrators" Single Sign-On (SSO) group.V-256371MEDIUMThe vCenter Server must limit membership to the "TrustedAdmins" Single Sign-On (SSO) group.V-256372MEDIUMThe vCenter server configuration must be backed up on a regular basis.V-256373MEDIUMvCenter task and event retention must be set to at least 30 days.V-256374MEDIUMvCenter Native Key Providers must be backed up with a strong password.