ESX/ESXi Host Security Hardening Guide
- Verify integrity of software before installation, check SHA1 hash after downloading.
- Ensure mutual-CHAP for iSCSI authentication
- Unique CHAP secret for each host for iSCSI
- Maks and zone SAN resource appropriately
- Replace self-signed certificate with commercial or trusted CA
- Configure SSL timeout, certificate non default location
- Disable managed object browser. proxy.xml file
- ESX only, disable vSphere Web Access
- Ensure that ESX is configure to encrypt all sessions in proxy.xml file. httpswith Redirect or httpsOnly
- Configure remote syslog
- Configure persistent logging (by default 1 day or after reboot)
- Configure NTP time synchronizaiton with internal server
- Control access by CIM-based hardware monitoring tools.create a service account, instead of root
- For ESXi, properly configure SNMP. If not using SNMP, disalbe snmp service.
- For ESXi, maintain the integrity of configuration file.
- Prevent the unintended use of VMsafe CPU/memory or VMsafe-Net
- Ensure only authorized users have access to DCUI (the users in localadmin group)
- Enable lockdown mode to restrict remote root access; prevent API-based access by root account
- Make sure root account is not a member of any groups other than defaults.
- Disable technical support mode (TSM via Out-of-Band access)
No comments:
Post a Comment