U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CIS VMware ESX Server 3.5 Benchmark v1.2.0 Checklist Details (Checklist Revisions)

Supporting Resources:

Target:

Target CPE Name
VMware ESX Server 3.0.0 cpe:/o:vmware:esx:3.0.0 (View CVEs)
VMware ESX Server 3.0.1 cpe:/o:vmware:esx:3.0.1 (View CVEs)
VMware ESX Server 3.0.2 cpe:/o:vmware:esx:3.0.2 (View CVEs)
VMware ESX Server 3.1 cpe:/o:vmware:esx:3.1 (View CVEs)
VMware ESX Server 3.2 cpe:/o:vmware:esx:3.2 (View CVEs)
VMware ESX Server 3.3 cpe:/o:vmware:esx:3.3 (View CVEs)
VMware ESX Server 3.5 cpe:/o:vmware:esx:3.5 (View CVEs)

Checklist Highlights

Checklist Name:
CIS VMware ESX Server 3.5 Benchmark
Checklist ID:
268
Version:
v1.2.0
Type:
Compliance
Review Status:
Archived
Authority:
Third Party: Center for Internet Security (CIS)
Original Publication Date:
12/31/2009

Checklist Summary:

This document addresses the security aspects of virtual machine technologies and VMware ESX Server 3.x implementations. While these topics cannot be completely separated from the standard security issues of operating a physical computer or basic issues of running the individual operating systems involved, this document?s primary focus is on virtual machine security issues. For this reason, we do not cover all of the steps needed to harden the guest operating systems. The Center for Internet Security has multiple documents, which address guest operating system security recommendations. Recommendations are based on a variety of public sources and input from members of the Center for Internet Security (CIS).

Checklist Role:

  • Virtualization Server

Known Issues:

Not provided.

Target Audience:

This document is intended for system administrators, but should be read by anyone responsible for installing and/or configuring Virtual Machines. In the context of this document, a system administrator is defined as someone who can create and manage accounts and groups, understands how operating systems perform access control, understands how to set account policies and user rights, is familiar with auditing and read audit logs, and can configure other similar system-related functionality.

Target Operational Environment:

  • Managed

Testing Information:

Section 3 of CIS_VMware_ESX_Server_Benchmark_v1.0.pdf contains "Preconditions".

Regulatory Compliance:

Not provided.

Comments/Warnings/Miscellaneous:

Not provided.

Disclaimer:

Proper use of the recommendations requires careful analysis and adaptation to specific user requirements. The recommendations are not in any way intended to be a quick fix for anyone's information security needs. CIS makes no representations, warranties or covenants whatsoever as to (i) the positive or negative effect of the products or the recommendations on the operation or the security of any particular network, computer system, network device, software, hardware, or any component of any of the foregoing or (ii) the accuracy, reliability, timeliness or completeness of any product or recommendation. CIS is providing the products and the recommendations as is and as available without representations, warranties or covenants of any kind.

Product Support:

http://www.vmware.com/support/

Point of Contact:

cis-feedback@cisecurity.org

Sponsor:

http://www.cisecurity.org/

Licensing:

http://www.vmware.com/support/licensing.html Single-Processor Pricing & Licensing http://www.vmware.com/download/eula/single_processor.html Multi-Core Pricing & Licensing http://www.vmware.com/download/eula/multicore.html

Change History:

Updated URL - 7/26/19
updated status to archived - 2/23/24

Dependency/Requirements:

URL Description

References:

Reference URL Description

NIST checklist record last modified on 02/23/2024