On April 22, 2022 the Defense Information Systems Agency (DISA) released the third update to the VMware vSphere 6.7 STIG.
VMware vSphere 6.7 STIG – Version 1, Release 3 contains minor updates to the VMware vSphere 6.7 Photon OS STIG.
These updates include the following:
PHTN-67-000012
.
-a always,exit -F arch=b32 -S execve -C uid!=euid -F euid=0 -k execpriv
-a always,exit -F arch=b64 -S execve -C uid!=euid -F euid=0 -k execpriv
-a always,exit -F arch=b32 -S execve -C gid!=egid -F egid=0 -k execpriv
-a always,exit -F arch=b64 -S execve -C gid!=egid -F egid=0 -k execpriv
-a always,exit -F arch=b32 -S execve -C uid!=euid -F euid=0 execpriv
-a always,exit -F arch=b64 -S execve -C uid!=euid -F euid=0 execpriv
-a always,exit -F arch=b32 -S execve -C gid!=egid -F egid=0 execpriv
-a always,exit -F arch=b64 -S execve -C gid!=egid -F egid=0 execpriv
PHTN-67-000071
to include an additional acceptable result:
-a always,exit -S all -F path=/usr/bin/sudo -F perm=x -F auid>=1000 -F auid!=-1 -F key=privileged
PHTN-67-000021
to use an updated CLI command:
grep pam_cracklib /etc/pam.d/system-password|grep --color=always "ucredit=.."
grep "^password requisite pam_cracklib.so" /etc/pam.d/system-password|grep --color=always "enforce_for_root"
The VMware vSphere 6.7 STIG ZIP file contains the following documents and STIG implementation guides:
As usual with new releases of the DISA STIGs for VMware vSphere, I have updated my compliance alert content for vRealize Operations to include the latest changes as applicable to objects and settings monitored by vRealize Operations. You can download the vSphere 6.7 STIG compliance content from the Downloads page.
The VMware vSphere 6.7 STIG can be downloaded from the Public DoD Cyber Exchange STIGs Document Library by searching for VMware vSphere 6.7.
Search
Get Notified of Future Posts
Recent Posts