Solved

free vsphere compliance checker

Posted on 2013-11-21
12
294 Views
Last Modified: 2013-12-06
Are any of the vmware hardening guide security recommendations generally accepted as "essential", and priority. Our infrastructure team were looking align to the security of the hosts, vcenter and vnetwork in line with the vmware hardening guide, however by looking at the potential impact column of the spreadsheet - many of the settings seem to introduce many issues for operations/support- without seemingly improving the security massively either.

So I wondered if there were some higher priority secureity settings - and if so specific to vsphere and vnetwork which exactly which those are? I assume some are more important than others?
0
Comment
Question by:pma111
  • 7
  • 5
12 Comments
 
LVL 119
ID: 39665393
You will need to assess which Security Restrictions are important for your organization.

e.g. we work with a client, Security is so restricted you have to be escorted into a Locked ROOM to perform Administration on some VMware Solutions, and are searched when you leave the room!
0
 
LVL 3

Author Comment

by:pma111
ID: 39665403
I would still assume the security controls recommended by vmware must have some level of importance thought, surely. I.e. some more important that others, or offer more benefits than others. I.e. microsoft has critical and important in their recommendations.
0
 
LVL 119
ID: 39665424
Those are Security Patches, with different threat levels. e.g. OS potential hack issues.

VMware Hardening Guide Security are recommendations, you need to asses, the Risk in your business.

We do not know your business, what Security and Governance you have in place for physical servers?

Do you allow CDROM, USB flash drives, floppy drives to be used in your datacentre, with physical servers?

Do you have Passwords on all your KVMs in the datacentre?

Do you have a datcentre? - who is allowed into the datacentre?

Do people sign in and out, with a reason for why they visited?
0
U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

 
LVL 3

Author Comment

by:pma111
ID: 39665610
>Those are Security Patches, with different threat levels. e.g. OS potential hack issues.

As well as patches, the microsoft security compliance manager has a number of security configuration recommendaitons and ranks them as either critical or important . I wasnt sure if vmware ranked its security recommendaitons in a similar way, or whether the vmware experts couild give their view on which of the hardening guides settings are crucial, and which are less important.
0
 
LVL 119
ID: 39665613
Can you please answer my previous questions, and I can then advise you, as how Security Aware your Organization is?
0
 
LVL 119
ID: 39665617
Do you use Contract Staff for IT Administration?

Do you allow the use of usb flash drives and mobile phones in your organization?
0
 
LVL 3

Author Comment

by:pma111
ID: 39665681
Is that the core of the vmware recommendations, safeguards against physical access to your hosts?
0
 
LVL 3

Author Comment

by:pma111
ID: 39665695
Also not familiar with "KVM"?
0
 
LVL 119

Accepted Solution

by:
Andrew Hancock (VMware vExpert / EE MVE^2) earned 500 total points
ID: 39665700
Physical Access to any computer system, limits the risk of security, whether physical or virtual, but not all organization apply it, some have servers in open offices.

I'm trying to determine, what you think of the following items in *YOUR* Organization.

1. Do you allow CDROM on your physical servers?

2. Do you allow USB flash drives, with physical servers?

3.Do you allow floppy drives with physical servers?

4. Do you have Passwords on all your KVMs in the datacentre?

5. Do you have a datcentre? - who is allowed into the datacentre?

6. Do people sign in and out, with a reason for why they visited?

7. Do you use Contract Staff for IT Administration?

8. Do you allow the use of usb flash drives?

9. Do you allow mobile phones in your organization?

All the above have an element of security risk to any organization? So where does your organization fit in?
0
 
LVL 119
ID: 39665701
KVM - Keyboard, Video, Monitor switch, allows the use of one keyboard, video and monitor to multiple physical server consoles in the datacentre.
0
 
LVL 3

Author Comment

by:pma111
ID: 39665716
1-3 - as and when required

4 - would have to check

5 - yes

6 - they should do, whether its done or not, unsure

7 - occasionally

8-9 - yes, albeit encrypted (and users need to be added to security groups to drag data to them)
0
 
LVL 119
ID: 39665744
Thanks for answering the questions, so the same would apply to Virtual Machines. Based on a very quick assessment, you seem to have low security, if it was low, medium and high. (this may not be true of course!). Some clients, would answer NO, to all those questions.

You would have to allow virtual machine access to cdroms, floppy disks and usb drives, however there are methods to prevent this.
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Veeam Backup & Replication has added a new integration – Veeam Backup for Microsoft Office 365.  In this blog, we will discuss how you can benefit from Office 365 email backup with the Veeam’s new product and try to shed some light on the needs and …
In this article, I will show you HOW TO: Create your first Windows Virtual Machine on a VMware vSphere Hypervisor 6.5 (ESXi 6.5) Host Server, the Windows OS we will install is Windows Server 2016.
Teach the user how to use configure the vCenter Server storage filters Open vSphere Web Client:  Navigate to vCenter Server Advanced Settings: Add the four vCenter Server storage filters: Review the advanced settings: Modify the values of the four v…
Teach the user how to install and configure the vCenter Orchestrator virtual appliance Open vSphere Web Client: Deploy vCenter Orchestrator virtual appliance OVA file: Verify vCenter Orchestrator virtual appliance boots successfully: Connect to the …

803 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question