STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to STIGs

VMware vSphere 8.0 Virtual Machine Security Technical Implementation Guide

Version

V1R1

Release Date

Oct 11, 2023

SCAP Benchmark ID

VMW_vSphere_8.0_Virtual_Machine_STIG

Total Checks

25

Tags

vmware
CAT I: 0CAT II: 17CAT III: 8

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Export CKLExport CSVExport JSONDownload STIG ZIP

Checks (25)

V-258703LOWVirtual machines (VMs) must have copy operations disabled.V-258704LOWVirtual machines (VMs) must have drag and drop operations disabled.V-258705LOWVirtual machines (VMs) must have paste operations disabled.V-258706MEDIUMVirtual machines (VMs) must have virtual disk shrinking disabled.V-258707MEDIUMVirtual machines (VMs) must have virtual disk wiping disabled.V-258708MEDIUMVirtual machines (VMs) must limit console sharing.V-258709LOWVirtual machines (VMs) must limit informational messages from the virtual machine to the VMX file.V-258710MEDIUMVirtual machines (VMs) must prevent unauthorized removal, connection, and modification of devices.V-258711MEDIUMVirtual machines (VMs) must not be able to obtain host information from the hypervisor.V-258712LOWVirtual machines (VMs) must have shared salt values disabled.V-258713LOWVirtual machines (VMs) must disable access through the "dvfilter" network Application Programming Interface (API).V-258714MEDIUMVirtual machines (VMs) must be configured to lock when the last console connection is closed.V-258715LOWVirtual machines (VMs) must disable 3D features when not required.V-258716MEDIUMVirtual machines (VMs) must enable encryption for vMotion.V-258717MEDIUMVirtual machines (VMs) must enable encryption for Fault Tolerance.V-258718MEDIUMVirtual machines (VMs) must configure log size.V-258719MEDIUMVirtual machines (VMs) must configure log retention.V-258720MEDIUMVirtual machines (VMs) must enable logging.V-258721MEDIUMVirtual machines (VMs) must not use independent, nonpersistent disks.V-258722MEDIUMVirtual machines (VMs) must remove unneeded floppy devices.V-258723LOWVirtual machines (VMs) must remove unneeded CD/DVD devices.V-258724MEDIUMVirtual machines (VMs) must remove unneeded parallel devices.V-258725MEDIUMVirtual machines (VMs) must remove unneeded serial devices.V-258726MEDIUMVirtual machines (VMs) must remove unneeded USB devices.V-258727MEDIUMVirtual machines (VMs) must disable DirectPath I/O devices when not required.