[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

free vsphere compliance checker

Posted on 2013-11-21
12
Medium Priority
?
303 Views
Last Modified: 2013-12-06
Are any of the vmware hardening guide security recommendations generally accepted as "essential", and priority. Our infrastructure team were looking align to the security of the hosts, vcenter and vnetwork in line with the vmware hardening guide, however by looking at the potential impact column of the spreadsheet - many of the settings seem to introduce many issues for operations/support- without seemingly improving the security massively either.

So I wondered if there were some higher priority secureity settings - and if so specific to vsphere and vnetwork which exactly which those are? I assume some are more important than others?
0
Comment
Question by:pma111
  • 7
  • 5
12 Comments
 
LVL 124
ID: 39665393
You will need to assess which Security Restrictions are important for your organization.

e.g. we work with a client, Security is so restricted you have to be escorted into a Locked ROOM to perform Administration on some VMware Solutions, and are searched when you leave the room!
0
 
LVL 3

Author Comment

by:pma111
ID: 39665403
I would still assume the security controls recommended by vmware must have some level of importance thought, surely. I.e. some more important that others, or offer more benefits than others. I.e. microsoft has critical and important in their recommendations.
0
 
LVL 124
ID: 39665424
Those are Security Patches, with different threat levels. e.g. OS potential hack issues.

VMware Hardening Guide Security are recommendations, you need to asses, the Risk in your business.

We do not know your business, what Security and Governance you have in place for physical servers?

Do you allow CDROM, USB flash drives, floppy drives to be used in your datacentre, with physical servers?

Do you have Passwords on all your KVMs in the datacentre?

Do you have a datcentre? - who is allowed into the datacentre?

Do people sign in and out, with a reason for why they visited?
0
 [eBook] Windows Nano Server

Download this FREE eBook and learn all you need to get started with Windows Nano Server, including deployment options, remote management
and troubleshooting tips and tricks

 
LVL 3

Author Comment

by:pma111
ID: 39665610
>Those are Security Patches, with different threat levels. e.g. OS potential hack issues.

As well as patches, the microsoft security compliance manager has a number of security configuration recommendaitons and ranks them as either critical or important . I wasnt sure if vmware ranked its security recommendaitons in a similar way, or whether the vmware experts couild give their view on which of the hardening guides settings are crucial, and which are less important.
0
 
LVL 124
ID: 39665613
Can you please answer my previous questions, and I can then advise you, as how Security Aware your Organization is?
0
 
LVL 124
ID: 39665617
Do you use Contract Staff for IT Administration?

Do you allow the use of usb flash drives and mobile phones in your organization?
0
 
LVL 3

Author Comment

by:pma111
ID: 39665681
Is that the core of the vmware recommendations, safeguards against physical access to your hosts?
0
 
LVL 3

Author Comment

by:pma111
ID: 39665695
Also not familiar with "KVM"?
0
 
LVL 124

Accepted Solution

by:
Andrew Hancock (VMware vExpert / EE MVE^2) earned 2000 total points
ID: 39665700
Physical Access to any computer system, limits the risk of security, whether physical or virtual, but not all organization apply it, some have servers in open offices.

I'm trying to determine, what you think of the following items in *YOUR* Organization.

1. Do you allow CDROM on your physical servers?

2. Do you allow USB flash drives, with physical servers?

3.Do you allow floppy drives with physical servers?

4. Do you have Passwords on all your KVMs in the datacentre?

5. Do you have a datcentre? - who is allowed into the datacentre?

6. Do people sign in and out, with a reason for why they visited?

7. Do you use Contract Staff for IT Administration?

8. Do you allow the use of usb flash drives?

9. Do you allow mobile phones in your organization?

All the above have an element of security risk to any organization? So where does your organization fit in?
0
 
LVL 124
ID: 39665701
KVM - Keyboard, Video, Monitor switch, allows the use of one keyboard, video and monitor to multiple physical server consoles in the datacentre.
0
 
LVL 3

Author Comment

by:pma111
ID: 39665716
1-3 - as and when required

4 - would have to check

5 - yes

6 - they should do, whether its done or not, unsure

7 - occasionally

8-9 - yes, albeit encrypted (and users need to be added to security groups to drag data to them)
0
 
LVL 124
ID: 39665744
Thanks for answering the questions, so the same would apply to Virtual Machines. Based on a very quick assessment, you seem to have low security, if it was low, medium and high. (this may not be true of course!). Some clients, would answer NO, to all those questions.

You would have to allow virtual machine access to cdroms, floppy disks and usb drives, however there are methods to prevent this.
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article, I show you step by step with screenshots to assist you - HOW TO: Deploy and Install the VMware vCenter Server Appliance 6.5 (VCSA 6.5), with some helpful tips along the way.
In this article, I am going to show you how to simulate a multi-site Lab environment on a single Hyper-V host. I use this method successfully in my own lab to simulate three fully routed global AD Sites on a Windows 10 Hyper-V host.
How to install and configure Citrix XenApp 6.5 - Part 1. In this video tutorial we have explained step by step installation of Citrix XenApp 6.5 Server on Windows Server 2008 R2 is explained in this video. We have explained the difference between…
This course is ideal for IT System Administrators working with VMware vSphere and its associated products in their company infrastructure. This course teaches you how to install and maintain this virtualization technology to store data, prevent vuln…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question