ESXi 5 Virtual Machine STIG Version 2 Release 1 Checklist Details (Checklist Revisions)
NOTE
This is not the current revision of this Checklist, view the current revision.
Supporting Resources:
-
Download Standalone XCCDF 1.1.4 - ESXi 5 Virtual Machine STIG Version 1 Release 3
- Defense Information Systems Agency
Target:
Target | CPE Name |
---|---|
VMware ESXi 5.0 | cpe:/o:vmware:esxi:5.0 (View CVEs) |
VMware ESXi 5.0 Update 1 | cpe:/o:vmware:esxi:5.0:1 (View CVEs) |
VMware ESXi 5.0 Update 2 | cpe:/o:vmware:esxi:5.0:2 (View CVEs) |
VMware ESXi 5.1 | cpe:/o:vmware:esxi:5.1 (View CVEs) |
Checklist Highlights
- Checklist Name:
- ESXi 5 Virtual Machine STIG
- Checklist ID:
- 469
- Version:
- Version 2 Release 1
- Type:
- Compliance
- Review Status:
- Final
- Authority:
- Governmental Authority: Defense Information Systems Agency
- Original Publication Date:
- 07/17/2013
Checklist Summary:
This VMware ESXi Version 5 Virtual Machine (ESXi 5 VM) Technology Overview, along with the ESXi 5 VM STIG, provides the technical security policies, requirements, and implementation details for applying security concepts to virtual machines running under the ESXi Version 5 hypervisor. The VMware vSphere 5 Security Hardening Guide contains product-specific, best-practices requirements for VMware ESXi 5 virtual machines. This hardening guide describes the ESXi 5 virtual machine built-in security features, and the measures to safeguard ESXi 5 virtual machines from attack. This hardening guide may be used to secure the vSphere 5 environment for VMware vCenter Server 5 and VMware ESXi 5. This guide was used as input into this STIG.
Checklist Role:
- Operating System
- Virtualization Server
Known Issues:
Not provided.
Target Audience:
The security requirements contained within this STIG are designed to assist Security Managers (SMs), Information Assurance Managers (IAMs), Information Assurance Officers (IAOs), and System Administrators (SAs) with configuring and maintaining security controls for virtual machines in a VMware vSphere environment. This document is not a guide to ESXi 5 VM system administration.
Target Operational Environment:
- Managed
- Specialized Security-Limited Functionality (SSLF)
Testing Information:
Not provided.
Regulatory Compliance:
DoD Directive (DoDD) 8500.1 and 8500.2
Comments/Warnings/Miscellaneous:
Comments or proposed revisions to this document should be sent via email to disa.letterkenny.FSO.mbx.stig-customer-support-mailbox@mail.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document.
Disclaimer:
Not provided.
Product Support:
Comments or proposed revisions to this document should be sent via email to disa.letterkenny.FSO.mbx.stig-customer-support-mailbox@mail.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document.
Point of Contact:
disa.letterkenny.FSO.mbx.stig-customer-support-mailbox@mail.mil
Sponsor:
Not provided.
Licensing:
Not provided.
Change History:
Version 1, Release 2 - 24 January 2014 Version 1, Release 1 - 17 July 2013 Version 1, Release 3 - 26 January 2015
Dependency/Requirements:
URL | Description |
---|---|
http://iase.disa.mil/stigs/Documents/u_vmware_esxi5_virtual_machine_stig_v1_releasememo.pdf | ESXi 5 Virtual Machine STIG Release Memo |
References:
Reference URL | Description |
---|