ESX Console OS (COS) security hardening guide
- Console network protection
- Ensure that ESX firewall is configured to high security. (By default)
- limit network access to applicatons and services
- Don't run NFS clients or NIS clients in the service console.
- Don't apply Red Hat patch to service console.
- Don't rely on patch tools for Red Hat
- Don't manage service console as a Red Hat host
- limit the use of service console
- use directory for authentication
- password complexity
- password history
- password aging
- password minimum days
- vpxuser auto-password change in vCenter, every 30 days, lower than password aging policy at COS
- Config syslog logging
- Config NTP time synchronization
- Prevent root file system from filling up
- Maintaining file system integrity
- Permission of important files and utility command
- Prevent tampering at boot time: grub password
- Required authentication for single user mode
- Disable SSH for root account.
- Disable console root login, using sudo or su
- limit the access to su command
- Configure and use sudo to control administrative access.
No comments:
Post a Comment