Virtual Machine Manager Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- SRG-OS-000001-VMM-000010
- Vuln IDs
-
- V-207338
- V-56553
- Rule IDs
-
- SV-207338r378478_rule
- SV-70813
Checks: C-7595r365424_chk
Verify the VMM provides automated mechanisms for supporting account management functions. If it does not, this is a finding.
Fix: F-7595r365425_fix
Configure the VMM to provide automated mechanisms for supporting account management functions.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000016
- Version
- SRG-OS-000002-VMM-000020
- Vuln IDs
-
- V-207339
- V-56819
- Rule IDs
-
- SV-207339r378481_rule
- SV-71079
Checks: C-7596r365427_chk
Verify the VMM automatically removes or disables local temporary user accounts after 72 hours. If it does not, this is a finding.
Fix: F-7596r365428_fix
Configure the VMM to automatically remove or disable local temporary user accounts after 72 hours.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000017
- Version
- SRG-OS-000003-VMM-000030
- Vuln IDs
-
- V-207340
- V-56821
- Rule IDs
-
- SV-207340r378484_rule
- SV-71081
Checks: C-7597r365430_chk
Verify the VMM automatically disables local accounts after a 35-day period of account inactivity. If it does not, this is a finding.
Fix: F-7597r365431_fix
Configure the VMM to automatically disable local accounts after a 35-day period of account inactivity.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- SRG-OS-000004-VMM-000040
- Vuln IDs
-
- V-207341
- V-56825
- Rule IDs
-
- SV-207341r378487_rule
- SV-71085
Checks: C-7598r365433_chk
Verify the VMM automatically audits account creation. If it does not, this is a finding.
Fix: F-7598r365434_fix
Configure the VMM to automatically audit account creation.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- SRG-OS-000021-VMM-000050
- Vuln IDs
-
- V-207342
- V-56833
- Rule IDs
-
- SV-207342r378517_rule
- SV-71093
Checks: C-7599r365436_chk
Verify the VMM enforces the limit of three consecutive invalid logon attempts by a user during a 15-minute time period. If it does not, this is a finding.
Fix: F-7599r365437_fix
Configure the VMM to enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period, by locking the account.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000048
- Version
- SRG-OS-000023-VMM-000060
- Vuln IDs
-
- V-207343
- V-56839
- Rule IDs
-
- SV-207343r378520_rule
- SV-71099
Checks: C-7600r365439_chk
Verify the VMM displays the Standard Mandatory DoD Notice and Consent Banner before granting access to the system. If it does not, this is a finding. The banner must be formatted in accordance with applicable DoD policy. Use the following verbiage for a VMM that can accommodate banners of 1300 characters: "You are accessing a U.S. Government (USG) VMM (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." Use the following verbiage for VMMs that have severe limitations on the number of characters that can be displayed in the banner: "I've read & consent to terms in IS user agreem't."
Fix: F-7600r365440_fix
Configure the VMM to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system. The banner must be formatted in accordance with applicable DoD policy. Use the following verbiage for a VMM that can accommodate banners of 1300 characters: "You are accessing a U.S. Government (USG) VMM (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." Use the following verbiage for VMMs that have severe limitations on the number of characters that can be displayed in the banner: "I've read & consent to terms in IS user agreem't."
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000050
- Version
- SRG-OS-000024-VMM-000070
- Vuln IDs
-
- V-207344
- V-56847
- Rule IDs
-
- SV-207344r378523_rule
- SV-71107
Checks: C-7601r365442_chk
Verify the VMM retains the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access. If it does not, this is a finding.
Fix: F-7601r365443_fix
Configure the VMM to retain the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- SRG-OS-000027-VMM-000080
- Vuln IDs
-
- V-207345
- V-56855
- Rule IDs
-
- SV-207345r378532_rule
- SV-71115
Checks: C-7602r365445_chk
Verify the VMM limits the number of concurrent sessions to ten for all accounts and/or account types. If it does not, this is a finding.
Fix: F-7602r365446_fix
Configure the VMM to limit the number of concurrent sessions to ten for all accounts and/or account types.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000056
- Version
- SRG-OS-000028-VMM-000090
- Vuln IDs
-
- V-207346
- V-56857
- Rule IDs
-
- SV-207346r378535_rule
- SV-71117
Checks: C-7603r365448_chk
Verify the VMM retains the session lock until the user reestablishes access using established identification and authentication procedures. If it does not, this is a finding.
Fix: F-7603r365449_fix
Configure the VMM to retain the session lock until the user reestablishes access using established identification and authentication procedures.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- SRG-OS-000029-VMM-000100
- Vuln IDs
-
- V-207347
- V-56859
- Rule IDs
-
- SV-207347r378598_rule
- SV-71119
Checks: C-7604r365451_chk
Verify the VMM initiates a session lock after a 15-minute period of inactivity. If it does not, this is a finding.
Fix: F-7604r365452_fix
Configure the VMM to initiate a session lock after a 15-minute period of inactivity.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000058
- Version
- SRG-OS-000030-VMM-000110
- Vuln IDs
-
- V-207348
- V-56863
- Rule IDs
-
- SV-207348r378601_rule
- SV-71123
Checks: C-7605r365454_chk
Verify the VMM provides the capability for users to directly initiate a session lock. If it does not, this is a finding.
Fix: F-7605r365455_fix
Configure the VMM to provide the capability for users to directly initiate a session lock.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000060
- Version
- SRG-OS-000031-VMM-000120
- Vuln IDs
-
- V-207349
- V-56867
- Rule IDs
-
- SV-207349r378604_rule
- SV-71127
Checks: C-7606r365457_chk
Verify the VMM conceals, via the session lock, information previously visible on the display with a publicly viewable image. If it does not, this is a finding.
Fix: F-7606r365458_fix
Configure the VMM to conceal, via the session lock, information previously visible on the display with a publicly viewable image.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- SRG-OS-000032-VMM-000130
- Vuln IDs
-
- V-207350
- V-56871
- Rule IDs
-
- SV-207350r378607_rule
- SV-71131
Checks: C-7607r365460_chk
Verify the VMM monitors remote access methods automatically. If it does not, this is a finding.
Fix: F-7607r365461_fix
Configure the VMM to monitor remote access methods automatically.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- SRG-OS-000033-VMM-000140
- Vuln IDs
-
- V-207351
- V-56873
- Rule IDs
-
- SV-207351r378610_rule
- SV-71133
Checks: C-7608r365463_chk
Verify the VMM uses DoD-approved encryption to protect the confidentiality of remote access sessions. If it does not, this is a finding.
Fix: F-7608r365464_fix
Configure the VMM to use DoD-approved encryption to protect the confidentiality of remote access sessions.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SRG-OS-000037-VMM-000150
- Vuln IDs
-
- V-207352
- V-56875
- Rule IDs
-
- SV-207352r378616_rule
- SV-71135
Checks: C-7609r365466_chk
Verify the VMM produces audit records containing information to establish what type of events occurred. If it does not, this is a finding.
Fix: F-7609r365467_fix
Configure the VMM to produce audit records containing information to establish what type of events occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- SRG-OS-000038-VMM-000160
- Vuln IDs
-
- V-207353
- V-56879
- Rule IDs
-
- SV-207353r378619_rule
- SV-71139
Checks: C-7610r365469_chk
Verify the VMM produces audit records containing information to establish when (date and time) the events occurred. If it does not, this is a finding.
Fix: F-7610r365470_fix
Configure the VMM to produce audit records containing information to establish when (date and time) the events occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-OS-000039-VMM-000170
- Vuln IDs
-
- V-207354
- V-56881
- Rule IDs
-
- SV-207354r378622_rule
- SV-71141
Checks: C-7611r365472_chk
Verify the VMM produces audit records containing information to establish where the events occurred. If it does not, this is a finding.
Fix: F-7611r365473_fix
Configure the VMM to produce audit records containing information to establish where the events occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SRG-OS-000040-VMM-000180
- Vuln IDs
-
- V-207355
- V-56885
- Rule IDs
-
- SV-207355r378625_rule
- SV-71145
Checks: C-7612r365475_chk
Verify the VMM produces audit records containing information to establish the source of the events. If it does not, this is a finding.
Fix: F-7612r365476_fix
Configure the VMM to produce audit records containing information to establish the source of the events.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SRG-OS-000041-VMM-000190
- Vuln IDs
-
- V-207356
- V-56889
- Rule IDs
-
- SV-207356r378628_rule
- SV-71149
Checks: C-7613r365478_chk
Verify the VMM produces audit records containing information to establish the outcome of the events. If it does not, this is a finding.
Fix: F-7613r365479_fix
Configure the VMM to produce audit records containing information to establish the outcome of the events.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- SRG-OS-000042-VMM-000200
- Vuln IDs
-
- V-207357
- V-56891
- Rule IDs
-
- SV-207357r378631_rule
- SV-71151
Checks: C-7614r365481_chk
Verify the VMM generates audit records containing the full-text recording of privileged commands or the individual identities of group account users. If it does not, this is a finding.
Fix: F-7614r365482_fix
Configure the VMM to generate audit records containing the full-text recording of privileged commands or the individual identities of group account users.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000139
- Version
- SRG-OS-000046-VMM-000210
- Vuln IDs
-
- V-207358
- V-56893
- Rule IDs
-
- SV-207358r378634_rule
- SV-71153
Checks: C-7615r365484_chk
Verify the VMM alerts the ISSO and SA (at a minimum) in the event of an audit processing failure. If it does not, this is a finding.
Fix: F-7615r365485_fix
Configure the VMM to alert the ISSO and SA (at a minimum) in the event of an audit processing failure.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000140
- Version
- SRG-OS-000047-VMM-000220
- Vuln IDs
-
- V-207359
- V-56895
- Rule IDs
-
- SV-207359r378637_rule
- SV-71155
Checks: C-7616r365487_chk
Verify the VMM shuts down by default upon audit failure (unless availability is an overriding concern). If it does not, this is a finding.
Fix: F-7616r365488_fix
Configure the VMM to shut down by default upon audit failure (unless availability is an overriding concern).
- RMF Control
- AU-6
- Severity
- M
- CCI
- CCI-000154
- Version
- SRG-OS-000051-VMM-000230
- Vuln IDs
-
- V-207360
- V-56897
- Rule IDs
-
- SV-207360r378640_rule
- SV-71157
Checks: C-7617r365490_chk
Verify the VMM supports the capability to centrally review and analyze audit records from multiple components within the system. If it does not, this is a finding.
Fix: F-7617r365491_fix
Configure the VMM to support the capability to centrally review and analyze audit records from multiple components within the system.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-000158
- Version
- SRG-OS-000054-VMM-000240
- Vuln IDs
-
- V-207361
- V-56899
- Rule IDs
-
- SV-207361r378643_rule
- SV-71159
Checks: C-7618r365493_chk
Verify the VMM supports the capability to filter audit records for events of interest based upon all audit fields within audit records. If it does not, this is a finding.
Fix: F-7618r365494_fix
Configure the VMM to support the capability to filter audit records for events of interest based upon all audit fields within audit records.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-000159
- Version
- SRG-OS-000055-VMM-000250
- Vuln IDs
-
- V-207362
- V-56901
- Rule IDs
-
- SV-207362r378646_rule
- SV-71161
Checks: C-7619r365496_chk
Verify the VMM uses internal system clocks to generate time stamps for audit records. If it does not, this is a finding.
Fix: F-7619r365497_fix
Configure the VMM to use internal system clocks to generate time stamps for audit records.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- SRG-OS-000057-VMM-000260
- Vuln IDs
-
- V-207363
- V-56905
- Rule IDs
-
- SV-207363r378649_rule
- SV-71165
Checks: C-7620r365499_chk
Verify the VMM protects audit information from unauthorized read access. If it does not, this is a finding.
Fix: F-7620r365500_fix
Configure the VMM to protect audit information from unauthorized read access.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- SRG-OS-000058-VMM-000270
- Vuln IDs
-
- V-207364
- V-56907
- Rule IDs
-
- SV-207364r378652_rule
- SV-71167
Checks: C-7621r365502_chk
Verify the VMM protects audit information from unauthorized modification. If it does not, this is a finding.
Fix: F-7621r365503_fix
Configure the VMM to protect audit information from unauthorized modification.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- SRG-OS-000059-VMM-000280
- Vuln IDs
-
- V-207365
- V-56911
- Rule IDs
-
- SV-207365r378655_rule
- SV-71171
Checks: C-7622r365505_chk
Verify the VMM protects audit information from unauthorized deletion. If it does not, this is a finding.
Fix: F-7622r365506_fix
Configure the VMM to protect audit information from unauthorized deletion.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SRG-OS-000062-VMM-000300
- Vuln IDs
-
- V-207366
- V-56915
- Rule IDs
-
- SV-207366r378721_rule
- SV-71175
Checks: C-7623r365508_chk
Verify the VMM provides audit record generation capability for DoD-defined auditable events for all VMM components. If it does not, this is a finding. DoD has defined the list of events for which the VMM will provide an audit record generation capability as the following: (i) Successful and unsuccessful attempts to access, modify, or delete privileges, security objects, security levels, or categories of information (e.g., classification levels); (ii) Access actions, such as successful and unsuccessful logon attempts, privileged activities or other system level access, starting and ending time for user access to the system, concurrent logons from different workstations, successful and unsuccessful accesses to objects, all program initiations, and all direct access to the VMM; (iii) All account creations, modifications, disabling, and terminations; and (iv) All kernel module load, unload, and restart actions.
Fix: F-7623r365509_fix
Configure the VMM to provide audit record generation capability for DoD-defined auditable events for all VMM components. DoD has defined the list of events for which the VMM will provide an audit record generation capability as the following: (i) Successful and unsuccessful attempts to access, modify, or delete privileges, security objects, security levels, or categories of information (e.g., classification levels); (ii) Access actions, such as successful and unsuccessful logon attempts, privileged activities or other system level access, starting and ending time for user access to the system, concurrent logons from different workstations, successful and unsuccessful accesses to objects, all program initiations, and all direct access to the VMM; (iii) All account creations, modifications, disabling, and terminations; and (iv) All kernel module load, unload, and restart actions.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000171
- Version
- SRG-OS-000063-VMM-000310
- Vuln IDs
-
- V-207367
- V-56919
- Rule IDs
-
- SV-207367r378724_rule
- SV-71179
Checks: C-7624r365511_chk
Verify the VMM allows only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited. If it does not, this is a finding.
Fix: F-7624r365512_fix
Configure the VMM to allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000064-VMM-000320
- Vuln IDs
-
- V-207368
- V-56923
- Rule IDs
-
- SV-207368r378727_rule
- SV-71183
Checks: C-7625r365514_chk
Verify the VMM generates audit records when successful/unsuccessful attempts to access privileges occur. If it does not, this is a finding.
Fix: F-7625r365515_fix
Configure the VMM to generate audit records when successful/unsuccessful attempts to access privileges occur.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- SRG-OS-000066-VMM-000330
- Vuln IDs
-
- V-207369
- V-56925
- Rule IDs
-
- SV-207369r378730_rule
- SV-71185
Checks: C-7626r365517_chk
Verify the VMM, for PKI-based authentication, validates certificates by constructing a certification path (which includes status information) to an accepted trust anchor. If it does not, this is a finding.
Fix: F-7626r365518_fix
Configure the VMM, for PKI-based authentication, to validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- SRG-OS-000067-VMM-000340
- Vuln IDs
-
- V-207370
- V-56927
- Rule IDs
-
- SV-207370r378733_rule
- SV-71187
Checks: C-7627r365520_chk
Verify the VMM, for PKI-based authentication, enforces authorized access to the corresponding private key. If it does not, this is a finding.
Fix: F-7627r365521_fix
Configure the VMM, for PKI-based authentication, to enforce authorized access to the corresponding private key.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000187
- Version
- SRG-OS-000068-VMM-000350
- Vuln IDs
-
- V-207371
- V-56929
- Rule IDs
-
- SV-207371r378736_rule
- SV-71189
Checks: C-7628r365523_chk
Verify the VMM maps the authenticated identity to the user or group account for PKI-based authentication. If it does not, this is a finding.
Fix: F-7628r365524_fix
Configure the VMM to map the authenticated identity to the user or group account for PKI-based authentication.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000192
- Version
- SRG-OS-000069-VMM-000360
- Vuln IDs
-
- V-207372
- V-56931
- Rule IDs
-
- SV-207372r378739_rule
- SV-71191
Checks: C-7629r365526_chk
Verify the VMM enforces password complexity by requiring that at least one upper-case character be used. If it does not, this is a finding.
Fix: F-7629r365527_fix
Configure the VMM to enforce password complexity by requiring that at least one upper-case character be used.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000193
- Version
- SRG-OS-000070-VMM-000370
- Vuln IDs
-
- V-207373
- V-56933
- Rule IDs
-
- SV-207373r378742_rule
- SV-71193
Checks: C-7630r365529_chk
Verify the VMM enforces password complexity by requiring that at least one lower-case character be used. If it does not, this is a finding.
Fix: F-7630r365530_fix
Configure the VMM to enforce password complexity by requiring that at least one lower-case character be used.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000194
- Version
- SRG-OS-000071-VMM-000380
- Vuln IDs
-
- V-207374
- V-56969
- Rule IDs
-
- SV-207374r378745_rule
- SV-71229
Checks: C-7631r365532_chk
Verify the VMM enforces password complexity by requiring that at least one numeric character be used. If it does not, this is a finding.
Fix: F-7631r365533_fix
Configure the VMM to enforce password complexity by requiring that at least one numeric character be used.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000195
- Version
- SRG-OS-000072-VMM-000390
- Vuln IDs
-
- V-207375
- V-56971
- Rule IDs
-
- SV-207375r378748_rule
- SV-71231
Checks: C-7632r365535_chk
Verify the VMM requires the change of at least 8 of the total number of characters when passwords are changed. If it does not, this is a finding.
Fix: F-7632r365536_fix
Configure the VMM to require the change of at least 8 of the total number of characters when passwords are changed.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- SRG-OS-000073-VMM-000400
- Vuln IDs
-
- V-207376
- V-56943
- Rule IDs
-
- SV-207376r378751_rule
- SV-71203
Checks: C-7633r365538_chk
Verify the VMM stores only encrypted representations of passwords. If it does not, this is a finding.
Fix: F-7633r365539_fix
Configure the VMM to store only encrypted representations of passwords.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- SRG-OS-000074-VMM-000410
- Vuln IDs
-
- V-207377
- V-56945
- Rule IDs
-
- SV-207377r378754_rule
- SV-71205
Checks: C-7634r365541_chk
Verify the VMM transmits only encrypted representations of passwords. If it does not, this is a finding.
Fix: F-7634r365542_fix
Configure the VMM to transmit only encrypted representations of passwords.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000198
- Version
- SRG-OS-000075-VMM-000420
- Vuln IDs
-
- V-207378
- V-56947
- Rule IDs
-
- SV-207378r378757_rule
- SV-71207
Checks: C-7635r365544_chk
Verify the VMM enforces 24 hours/1 day as the minimum password lifetime. If it does not, this is a finding.
Fix: F-7635r365545_fix
Configure the VMM to enforce 24 hours/1 day as the minimum password lifetime.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000199
- Version
- SRG-OS-000076-VMM-000430
- Vuln IDs
-
- V-207379
- V-56949
- Rule IDs
-
- SV-207379r378760_rule
- SV-71209
Checks: C-7636r365547_chk
Verify the VMM enforces a 60-day maximum password lifetime restriction. If it does not, this is a finding.
Fix: F-7636r365548_fix
Configure the VMM to enforce a 60-day maximum password lifetime restriction.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000200
- Version
- SRG-OS-000077-VMM-000440
- Vuln IDs
-
- V-207380
- V-56951
- Rule IDs
-
- SV-207380r378763_rule
- SV-71211
Checks: C-7637r365550_chk
Verify the VMM prohibits password reuse for a minimum of five generations. If it does not, this is a finding.
Fix: F-7637r365551_fix
Configure the VMM to prohibit password reuse for a minimum of five generations.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- SRG-OS-000078-VMM-000450
- Vuln IDs
-
- V-207381
- V-56953
- Rule IDs
-
- SV-207381r378766_rule
- SV-71213
Checks: C-7638r365553_chk
Verify the VMM enforces a minimum 15-character password length. If it does not, this is a finding.
Fix: F-7638r365554_fix
Configure the VMM to enforce a minimum 15-character password length.
- RMF Control
- IA-6
- Severity
- M
- CCI
- CCI-000206
- Version
- SRG-OS-000079-VMM-000460
- Vuln IDs
-
- V-207382
- V-56955
- Rule IDs
-
- SV-207382r378769_rule
- SV-71215
Checks: C-7639r365556_chk
Verify the VMM obscures feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals. If it does not, this is a finding.
Fix: F-7639r365557_fix
Configure the VMM to obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- SRG-OS-000080-VMM-000470
- Vuln IDs
-
- V-207383
- V-56957
- Rule IDs
-
- SV-207383r378772_rule
- SV-71217
Checks: C-7640r365559_chk
Verify the VMM enforces approved authorizations for logical access to information and system resources in accordance with applicable access control policies. If it does not, this is a finding.
Fix: F-7640r365560_fix
Configure the VMM to enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-OS-000095-VMM-000480
- Vuln IDs
-
- V-207384
- V-56959
- Rule IDs
-
- SV-207384r378841_rule
- SV-71219
Checks: C-7641r365562_chk
Verify the VMM is configured to disable non-essential capabilities. If it is not, this is a finding.
Fix: F-7641r365563_fix
Configure the VMM to disable non-essential capabilities.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- SRG-OS-000096-VMM-000490
- Vuln IDs
-
- V-207385
- V-56961
- Rule IDs
-
- SV-207385r378844_rule
- SV-71221
Checks: C-7642r365565_chk
Verify the VMM is configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments. If it is not, this is a finding.
Fix: F-7642r365566_fix
Configure the VMM to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- SRG-OS-000104-VMM-000500
- Vuln IDs
-
- V-207386
- V-56963
- Rule IDs
-
- SV-207386r378847_rule
- SV-71223
Checks: C-7643r365568_chk
Verify the VMM uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users). If it does not, this is a finding.
Fix: F-7643r365569_fix
Configure the VMM to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000765
- Version
- SRG-OS-000105-VMM-000510
- Vuln IDs
-
- V-207387
- V-56965
- Rule IDs
-
- SV-207387r378850_rule
- SV-71225
Checks: C-7644r365571_chk
Verify the VMM uses multifactor authentication for network access to privileged accounts. If it does not, this is a finding.
Fix: F-7644r365572_fix
Configure the VMM to use multifactor authentication for network access to privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000766
- Version
- SRG-OS-000106-VMM-000520
- Vuln IDs
-
- V-207388
- V-56977
- Rule IDs
-
- SV-207388r378853_rule
- SV-71237
Checks: C-7645r365574_chk
Verify the VMM uses multifactor authentication for network access to non-privileged accounts. If it does not, this is a finding.
Fix: F-7645r365575_fix
Configure the VMM to use multifactor authentication for network access to non-privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000767
- Version
- SRG-OS-000107-VMM-000530
- Vuln IDs
-
- V-207389
- V-56979
- Rule IDs
-
- SV-207389r378856_rule
- SV-71239
Checks: C-7646r365577_chk
Verify the VMM uses multifactor authentication for local access to privileged accounts. If it does not, this is a finding.
Fix: F-7646r365578_fix
Configure the VMM to use multifactor authentication for local access to privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000768
- Version
- SRG-OS-000108-VMM-000540
- Vuln IDs
-
- V-207390
- V-56981
- Rule IDs
-
- SV-207390r378859_rule
- SV-71241
Checks: C-7647r365580_chk
Verify the VMM uses multifactor authentication for local access to non-privileged accounts. If it does not, this is a finding.
Fix: F-7647r365581_fix
Configure the VMM to use multifactor authentication for local access to non-privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000770
- Version
- SRG-OS-000109-VMM-000550
- Vuln IDs
-
- V-207391
- V-56983
- Rule IDs
-
- SV-207391r378862_rule
- SV-71243
Checks: C-7648r365583_chk
Verify the VMM requires individuals to be authenticated with an individual authenticator prior to using a group authenticator. If it does not, this is a finding.
Fix: F-7648r365584_fix
Configure the VMM to require individuals to be authenticated with an individual authenticator prior to using a group authenticator.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- SRG-OS-000112-VMM-000560
- Vuln IDs
-
- V-207392
- V-56985
- Rule IDs
-
- SV-207392r854604_rule
- SV-71245
Checks: C-7649r365586_chk
Verify the VMM implements replay-resistant authentication mechanisms for network access to privileged accounts. If it does not, this is a finding.
Fix: F-7649r365587_fix
Configure the VMM to implement replay-resistant authentication mechanisms for network access to privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001942
- Version
- SRG-OS-000113-VMM-000570
- Vuln IDs
-
- V-207393
- V-56987
- Rule IDs
-
- SV-207393r854605_rule
- SV-71247
Checks: C-7650r365589_chk
Verify the VMM implements replay-resistant authentication mechanisms for network access to non-privileged accounts. If it does not, this is a finding.
Fix: F-7650r365590_fix
Configure the VMM to implement replay-resistant authentication mechanisms for network access to non-privileged accounts.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-000778
- Version
- SRG-OS-000114-VMM-000580
- Vuln IDs
-
- V-207394
- V-56989
- Rule IDs
-
- SV-207394r378877_rule
- SV-71249
Checks: C-7651r365592_chk
Verify the VMM uniquely identifies peripherals before establishing a connection. If it does not, this is a finding.
Fix: F-7651r365593_fix
Configure the VMM to uniquely identify peripherals before establishing a connection.
- RMF Control
- IA-4
- Severity
- M
- CCI
- CCI-000795
- Version
- SRG-OS-000118-VMM-000590
- Vuln IDs
-
- V-207395
- V-56991
- Rule IDs
-
- SV-207395r378880_rule
- SV-71251
Checks: C-7652r365595_chk
Verify the VMM disables local account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity. If it does not, this is a finding.
Fix: F-7652r365596_fix
Configure the VMM to disable local account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- SRG-OS-000120-VMM-000600
- Vuln IDs
-
- V-207396
- V-56993
- Rule IDs
-
- SV-207396r378886_rule
- SV-71253
Checks: C-7653r365598_chk
Verify the VMM uses mechanisms meeting the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module. If it does not, this is a finding.
Fix: F-7653r365599_fix
Configure the VMM to use mechanisms meeting the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001876
- Version
- SRG-OS-000122-VMM-000610
- Vuln IDs
-
- V-207397
- V-56995
- Rule IDs
-
- SV-207397r854606_rule
- SV-71255
Checks: C-7654r365601_chk
Verify the VMM supports an audit reduction capability that supports on-demand reporting requirements. If it does not, this is a finding.
Fix: F-7654r365602_fix
Configure the VMM to support an audit reduction capability that supports on-demand reporting requirements.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001682
- Version
- SRG-OS-000123-VMM-000620
- Vuln IDs
-
- V-207398
- V-56997
- Rule IDs
-
- SV-207398r378895_rule
- SV-71257
Checks: C-7655r365604_chk
Verify the VMM is configured such that emergency administrator accounts are automatically removed or disabled after the crisis is resolved or 72 hours. If it is not, this is a finding.
Fix: F-7655r365605_fix
Configure the VMM such that emergency administrator accounts are automatically removed or disabled after the crisis is resolved or 72 hours.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-000877
- Version
- SRG-OS-000125-VMM-000630
- Vuln IDs
-
- V-207399
- V-56999
- Rule IDs
-
- SV-207399r378958_rule
- SV-71259
Checks: C-7656r365607_chk
Verify the VMM employs strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions. If it does not, this is a finding.
Fix: F-7656r365608_fix
Configure the VMM to employ strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-000879
- Version
- SRG-OS-000126-VMM-000640
- Vuln IDs
-
- V-207400
- V-57001
- Rule IDs
-
- SV-207400r378961_rule
- SV-71261
Checks: C-7657r365610_chk
Verify the VMM terminates all sessions and network connections when nonlocal maintenance is completed. If it does not, this is a finding.
Fix: F-7657r365611_fix
Configure the VMM to terminate all sessions and network connections when nonlocal maintenance is completed.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- SRG-OS-000132-VMM-000650
- Vuln IDs
-
- V-207401
- V-57003
- Rule IDs
-
- SV-207401r378967_rule
- SV-71263
Checks: C-7658r365613_chk
Verify the VMM separates user functionality (including user interface services) from VMM management functionality. If it does not, this is a finding.
Fix: F-7658r365614_fix
Configure the VMM to separate user functionality (including user interface services) from VMM management functionality.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- SRG-OS-000134-VMM-000660
- Vuln IDs
-
- V-207402
- V-57005
- Rule IDs
-
- SV-207402r378973_rule
- SV-71265
Checks: C-7659r365616_chk
Verify the VMM isolates security functions from non-security functions. If it does not, this is a finding.
Fix: F-7659r365617_fix
Configure the VMM to isolate security functions from non-security functions.
- RMF Control
- SC-4
- Severity
- M
- CCI
- CCI-001090
- Version
- SRG-OS-000138-VMM-000670
- Vuln IDs
-
- V-207403
- V-57007
- Rule IDs
-
- SV-207403r378982_rule
- SV-71267
Checks: C-7660r365619_chk
Verify the VMM prevents unauthorized and unintended information transfer via shared system resources. If it does not, this is a finding.
Fix: F-7660r365620_fix
Configure the VMM to prevent unauthorized and unintended information transfer via shared system resources.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- SRG-OS-000142-VMM-000690
- Vuln IDs
-
- V-207404
- V-57009
- Rule IDs
-
- SV-207404r378988_rule
- SV-71269
Checks: C-7661r365622_chk
Verify the VMM manages excess capacity, bandwidth, or other redundancy to limit the effects of information-flooding types of Denial of Service (DoS) attacks. If it does not, this is a finding.
Fix: F-7661r365623_fix
Configure the VMM to manage excess capacity, bandwidth, or other redundancy to limit the effects of information-flooding types of Denial of Service (DoS) attacks.
- RMF Control
- SC-10
- Severity
- M
- CCI
- CCI-001133
- Version
- SRG-OS-000163-VMM-000700
- Vuln IDs
-
- V-207405
- V-57011
- Rule IDs
-
- SV-207405r878140_rule
- SV-71271
Checks: C-7662r365625_chk
Verify the VMM terminates all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity; and for user sessions (non-privileged session), the session must be terminated after 15 minutes of inactivity, except to fulfill documented and validated mission requirements. If it does not, this is a finding.
Fix: F-7662r365626_fix
Configure the VMM to terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity; and for user sessions (non-privileged session), the session must be terminated after 15 minutes of inactivity, except to fulfill documented and validated mission requirements.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-OS-000184-VMM-000710
- Vuln IDs
-
- V-207406
- V-57013
- Rule IDs
-
- SV-207406r379081_rule
- SV-71273
Checks: C-7663r365628_chk
Verify the VMM fails to a secure state if system initialization fails, shutdown fails, or aborts fail. If it does not, this is a finding.
Fix: F-7663r365629_fix
Configure the VMM to fail to a secure state if system initialization fails, shutdown fails, or aborts fail.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- SRG-OS-000185-VMM-000720
- Vuln IDs
-
- V-207407
- V-57015
- Rule IDs
-
- SV-207407r379084_rule
- SV-71275
Checks: C-7664r365631_chk
Verify the VMM protects the confidentiality and integrity of all information at rest. If it does not, this is a finding.
Fix: F-7664r365632_fix
Configure the VMM to protect the confidentiality and integrity of all information at rest.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-001233
- Version
- SRG-OS-000191-VMM-000730
- Vuln IDs
-
- V-207408
- V-57017
- Rule IDs
-
- SV-207408r878139_rule
- SV-71277
Checks: C-7665r365634_chk
Verify the VMM employs automated mechanisms to determine the state of system components with regard to flaw remediation using the following frequency: continuously, where HBSS is used; 30 days, for any additional internal network scans not covered by HBSS; and annually, for external scans by Computer Network Defense Service Provider (CNDSP). If it does not, this is a finding.
Fix: F-7665r365635_fix
Configure the VMM to employ automated mechanisms to determine the state of system components with regard to flaw remediation using the following frequency: continuously, where HBSS is used; 30 days, for any additional internal network scans not covered by HBSS; and annually, for external scans by Computer Network Defense Service Provider (CNDSP).
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- SRG-OS-000203-VMM-000750
- Vuln IDs
-
- V-207409
- V-57019
- Rule IDs
-
- SV-207409r379102_rule
- SV-71279
Checks: C-7666r365637_chk
Verify the VMM checks the validity of all data inputs except those specifically identified by the organization. If it does not, this is a finding.
Fix: F-7666r365638_fix
Configure the VMM to check the validity of all data inputs except those specifically identified by the organization.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- SRG-OS-000205-VMM-000760
- Vuln IDs
-
- V-207410
- V-57021
- Rule IDs
-
- SV-207410r379105_rule
- SV-71281
Checks: C-7667r365640_chk
Verify the VMM generates error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries. If it does not, this is a finding.
Fix: F-7667r365641_fix
Configure the VMM to generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- SRG-OS-000206-VMM-000770
- Vuln IDs
-
- V-207411
- V-57023
- Rule IDs
-
- SV-207411r379108_rule
- SV-71283
Checks: C-7668r365643_chk
Verify the VMM reveals system error messages only to authorized users. If it does not, this is a finding.
Fix: F-7668r365644_fix
Configure the VMM to reveal system error messages only to authorized users.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- SRG-OS-000221-VMM-000800
- Vuln IDs
-
- V-207412
- V-57025
- Rule IDs
-
- SV-207412r379126_rule
- SV-71285
Checks: C-7669r365646_chk
Verify all interactions among guest VMs are mediated by the VMM or its service VMs to support proper function. If they are not, this is a finding.
Fix: F-7669r365647_fix
Configure all interactions among guest VMs to be mediated by the VMM or its service VMs to support proper function.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001403
- Version
- SRG-OS-000239-VMM-000810
- Vuln IDs
-
- V-207413
- V-57027
- Rule IDs
-
- SV-207413r379204_rule
- SV-71287
Checks: C-7670r365649_chk
Verify the VMM automatically audits account modification. If it does not, this is a finding.
Fix: F-7670r365650_fix
Configure the VMM to automatically audit account modification.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001404
- Version
- SRG-OS-000240-VMM-000820
- Vuln IDs
-
- V-207414
- V-57029
- Rule IDs
-
- SV-207414r379207_rule
- SV-71289
Checks: C-7671r365652_chk
Verify the VMM automatically audits account disabling actions. If it does not, this is a finding.
Fix: F-7671r365653_fix
Configure the VMM to automatically audit account disabling actions.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001405
- Version
- SRG-OS-000241-VMM-000830
- Vuln IDs
-
- V-207415
- V-57031
- Rule IDs
-
- SV-207415r379210_rule
- SV-71291
Checks: C-7672r365655_chk
Verify the VMM automatically audits account removal actions. If it does not, this is a finding.
Fix: F-7672r365656_fix
Configure the VMM to automatically audit account removal actions.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-OS-000242-VMM-000840
- Vuln IDs
-
- V-207416
- V-57033
- Rule IDs
-
- SV-207416r379213_rule
- SV-71293
Checks: C-7673r365658_chk
Verify all guest VM network communications are implemented through use of virtual network devices provisioned by the VMM. If they are not, this is a finding.
Fix: F-7673r365659_fix
Configure all guest VM network communications to be implemented through use of virtual network devices provisioned by the VMM.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-OS-000242-VMM-000850
- Vuln IDs
-
- V-207417
- V-57035
- Rule IDs
-
- SV-207417r379213_rule
- SV-71295
Checks: C-7674r365661_chk
Verify all interactions between guest VMs and external systems, via other interface devices, are mediated by the VMM or its service VMs. If they are not, this is a finding.
Fix: F-7674r365662_fix
Configure all interactions between guest VMs and external systems, via other interface devices, are mediated by the VMM or its service VMs.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- SRG-OS-000250-VMM-000860
- Vuln IDs
-
- V-207418
- V-57037
- Rule IDs
-
- SV-207418r379225_rule
- SV-71297
Checks: C-7675r365664_chk
Verify the VMM implements cryptography to protect the integrity of remote access sessions. If it does not, this is a finding.
Fix: F-7675r365665_fix
Configure the VMM to implement cryptography to protect the integrity of remote access sessions.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001464
- Version
- SRG-OS-000254-VMM-000880
- Vuln IDs
-
- V-207419
- V-57039
- Rule IDs
-
- SV-207419r379231_rule
- SV-71299
Checks: C-7676r365667_chk
Verify the VMM initiates session audits at system startup. If it does not, this is a finding.
Fix: F-7676r365668_fix
Configure the VMM to initiate session audits at system startup.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- SRG-OS-000255-VMM-000890
- Vuln IDs
-
- V-207420
- V-57041
- Rule IDs
-
- SV-207420r379234_rule
- SV-71301
Checks: C-7677r365670_chk
Verify the VMM produces audit records containing information to establish the identity of any individual or process associated with the event. If it does not, this is a finding.
Fix: F-7677r365671_fix
Configure the VMM to produce audit records containing information to establish the identity of any individual or process associated with the event.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- SRG-OS-000256-VMM-000900
- Vuln IDs
-
- V-207421
- V-57043
- Rule IDs
-
- SV-207421r379237_rule
- SV-71303
Checks: C-7678r365673_chk
Verify the VMM protects audit tools from unauthorized access. If it does not, this is a finding.
Fix: F-7678r365674_fix
Configure the VMM to protect audit tools from unauthorized access.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001494
- Version
- SRG-OS-000257-VMM-000910
- Vuln IDs
-
- V-207422
- V-57045
- Rule IDs
-
- SV-207422r379240_rule
- SV-71305
Checks: C-7679r365676_chk
Verify the VMM protects audit tools from unauthorized modification. If it does not, this is a finding.
Fix: F-7679r365677_fix
Configure the VMM to protect audit tools from unauthorized modification.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001495
- Version
- SRG-OS-000258-VMM-000920
- Vuln IDs
-
- V-207423
- V-57047
- Rule IDs
-
- SV-207423r379243_rule
- SV-71307
Checks: C-7680r365679_chk
Verify the VMM protects audits tools from unauthorized deletion. If it does not, this is a finding.
Fix: F-7680r365680_fix
Configure the VMM to protect audit tools from unauthorized deletion.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SRG-OS-000259-VMM-000930
- Vuln IDs
-
- V-207424
- V-57049
- Rule IDs
-
- SV-207424r379246_rule
- SV-71309
Checks: C-7681r365682_chk
Verify the VMM limits privileges to change software resident within software libraries. If it does not, this is a finding.
Fix: F-7681r365683_fix
Configure the VMM to limit privileges to change software resident within software libraries.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-001619
- Version
- SRG-OS-000266-VMM-000940
- Vuln IDs
-
- V-207425
- V-57051
- Rule IDs
-
- SV-207425r379249_rule
- SV-71311
Checks: C-7682r365685_chk
Verify the VMM enforces password complexity by requiring that at least one special character be used. If it does not, this is a finding.
Fix: F-7682r365686_fix
Configure the VMM to enforce password complexity by requiring that at least one special character be used.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001665
- Version
- SRG-OS-000269-VMM-000950
- Vuln IDs
-
- V-207426
- V-57053
- Rule IDs
-
- SV-207426r379318_rule
- SV-71313
Checks: C-7683r365688_chk
Verify the VMM preserves any information necessary, in the event of a system failure, to determine cause of failure and any information necessary to return to operations with least disruption to mission processes. If it does not, this is a finding.
Fix: F-7683r365689_fix
Configure the VMM to preserve any information necessary, in the event of a system failure, to determine cause of failure and any information necessary to return to operations with least disruption to mission processes.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001683
- Version
- SRG-OS-000274-VMM-000960
- Vuln IDs
-
- V-207427
- V-57055
- Rule IDs
-
- SV-207427r379321_rule
- SV-71315
Checks: C-7684r365691_chk
Verify the VMM notifies system administrators and ISSOs when accounts are created. If it does not, this is a finding.
Fix: F-7684r365692_fix
Configure the VMM to notify system administrators and ISSOs when accounts are created.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001684
- Version
- SRG-OS-000275-VMM-000970
- Vuln IDs
-
- V-207428
- V-57057
- Rule IDs
-
- SV-207428r379324_rule
- SV-71317
Checks: C-7685r365694_chk
Verify the VMM notifies the system administrator and ISSO when accounts are modified. If it does not, this is a finding.
Fix: F-7685r365695_fix
Configure the VMM to notify the system administrator and ISSO when accounts are modified.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001685
- Version
- SRG-OS-000276-VMM-000980
- Vuln IDs
-
- V-207429
- V-57059
- Rule IDs
-
- SV-207429r379327_rule
- SV-71319
Checks: C-7686r365697_chk
Verify the VMM notifies the system administrator and ISSO when accounts are disabled. If it does not, this is a finding.
Fix: F-7686r365698_fix
Configure the VMM to notify the system administrator and ISSO when accounts are disabled.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001686
- Version
- SRG-OS-000277-VMM-000990
- Vuln IDs
-
- V-207430
- V-57061
- Rule IDs
-
- SV-207430r379330_rule
- SV-71321
Checks: C-7687r365700_chk
Verify the VMM notifies the system administrator and ISSO when accounts are removed. If it does not, this is a finding.
Fix: F-7687r365701_fix
Configure the VMM to notify the system administrator and ISSO when accounts are removed.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001496
- Version
- SRG-OS-000278-VMM-001000
- Vuln IDs
-
- V-207431
- V-57063
- Rule IDs
-
- SV-207431r379333_rule
- SV-71323
Checks: C-7688r365703_chk
Verify the VMM uses cryptographic mechanisms to protect the integrity of audit tools. If it does not, this is a finding.
Fix: F-7688r365704_fix
Configure the VMM to use cryptographic mechanisms to protect the integrity of audit tools.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- SRG-OS-000279-VMM-001010
- Vuln IDs
-
- V-207432
- V-57065
- Rule IDs
-
- SV-207432r854607_rule
- SV-71325
Checks: C-7689r365706_chk
Verify the VMM automatically terminates a user session after inactivity timeouts have expired or at shutdown. If it does not, this is a finding.
Fix: F-7689r365707_fix
Configure the VMM to automatically terminate a user session after inactivity timeouts have expired or at shutdown.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002363
- Version
- SRG-OS-000280-VMM-001020
- Vuln IDs
-
- V-207433
- V-57067
- Rule IDs
-
- SV-207433r854608_rule
- SV-71327
Checks: C-7690r365709_chk
Verify VMMs requiring user access authentication provide a logout capability for user-initiated communications sessions. If they do not, this is a finding.
Fix: F-7690r365710_fix
Configure VMMs requiring user access authentication to provide a logout capability for user-initiated communications sessions.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002364
- Version
- SRG-OS-000281-VMM-001030
- Vuln IDs
-
- V-207434
- V-57069
- Rule IDs
-
- SV-207434r854609_rule
- SV-71329
Checks: C-7691r365712_chk
Verify the VMM displays an explicit logout message to users indicating the reliable termination of authenticated communications sessions. If it does not, this is a finding.
Fix: F-7691r365713_fix
Configure the VMM to display an explicit logout message to users indicating the reliable termination of authenticated communications sessions.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- SRG-OS-000297-VMM-001040
- Vuln IDs
-
- V-207435
- V-57071
- Rule IDs
-
- SV-207435r854610_rule
- SV-71331
Checks: C-7692r365715_chk
Verify the VMM controls remote access methods. If it does not, this is a finding.
Fix: F-7692r365716_fix
Configure the VMM to control remote access methods.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002322
- Version
- SRG-OS-000298-VMM-001050
- Vuln IDs
-
- V-207436
- V-57073
- Rule IDs
-
- SV-207436r854611_rule
- SV-71333
Checks: C-7693r365718_chk
Verify the VMM provides the capability to immediately disconnect or disable remote access to the information system. If it does not, this is a finding.
Fix: F-7693r365719_fix
Configure the VMM to provide the capability to immediately disconnect or disable remote access to the information system.
- RMF Control
- AC-18
- Severity
- M
- CCI
- CCI-001444
- Version
- SRG-OS-000299-VMM-001060
- Vuln IDs
-
- V-207437
- V-57075
- Rule IDs
-
- SV-207437r379456_rule
- SV-71335
Checks: C-7694r365721_chk
Verify the VMM protects wireless access to the system using encryption. If it does not, this is a finding.
Fix: F-7694r365722_fix
Configure the VMM to protect wireless access to the system using encryption.
- RMF Control
- AC-18
- Severity
- M
- CCI
- CCI-001443
- Version
- SRG-OS-000300-VMM-001070
- Vuln IDs
-
- V-207438
- V-57077
- Rule IDs
-
- SV-207438r379459_rule
- SV-71337
Checks: C-7695r365724_chk
Verify the VMM protects wireless access to the system using authentication of users and/or devices. If it does not, this is a finding.
Fix: F-7695r365725_fix
Configure the VMM to protect wireless access to the system using authentication of users and/or devices.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002130
- Version
- SRG-OS-000303-VMM-001090
- Vuln IDs
-
- V-207439
- V-57079
- Rule IDs
-
- SV-207439r854612_rule
- SV-71339
Checks: C-7696r365727_chk
Verify the VMM automatically audits account enabling actions. If it does not, this is a finding.
Fix: F-7696r365728_fix
Configure the VMM to automatically audit account enabling actions.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002132
- Version
- SRG-OS-000304-VMM-001100
- Vuln IDs
-
- V-207440
- V-57081
- Rule IDs
-
- SV-207440r854613_rule
- SV-71341
Checks: C-7697r365730_chk
Verify the VMM notifies the system administrator and ISSO of account enabling actions. If it does not, this is a finding.
Fix: F-7697r365731_fix
Configure the VMM to notify the system administrator and ISSO of account enabling actions.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- SRG-OS-000312-VMM-001110
- Vuln IDs
-
- V-207441
- V-57083
- Rule IDs
-
- SV-207441r854614_rule
- SV-71343
Checks: C-7698r365733_chk
Verify the VMM implements discretionary access controls to allow VMM admins to pass information to any other VMM admin, user, or guest VM. If it does not, this is a finding.
Fix: F-7698r365734_fix
Configure the VMM to implement discretionary access controls to allow VMM admins to pass information to any other VMM admin, user, or guest VM.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- SRG-OS-000312-VMM-001120
- Vuln IDs
-
- V-207442
- V-57085
- Rule IDs
-
- SV-207442r854615_rule
- SV-71345
Checks: C-7699r365736_chk
Verify the VMM implements discretionary access controls to allow VMM admins to grant their privileges to other VMM admins. If it does not, this is a finding.
Fix: F-7699r365737_fix
Configure the VMM to implement discretionary access controls to allow VMM admins to grant their privileges to other VMM admins.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- SRG-OS-000312-VMM-001130
- Vuln IDs
-
- V-207443
- V-57087
- Rule IDs
-
- SV-207443r854616_rule
- SV-71347
Checks: C-7700r365739_chk
Verify the VMM implements discretionary access controls to allow VMM admins to change security attributes on users, guest VMs, the VMM, or the VMM's components. If it does not, this is a finding.
Fix: F-7700r365740_fix
Configure the VMM to implement discretionary access controls to allow VMM admins to change security attributes on users, guest VMs, the VMM, or the VMM's components.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- SRG-OS-000312-VMM-001140
- Vuln IDs
-
- V-207444
- V-57089
- Rule IDs
-
- SV-207444r854617_rule
- SV-71349
Checks: C-7701r365742_chk
Verify the VMM implements discretionary access controls to allow VMM admins to choose the security attributes to be associated with newly created or revised guest VMs. If it does not, this is a finding.
Fix: F-7701r365743_fix
Configure the VMM to implement discretionary access controls to allow VMM admins to choose the security attributes to be associated with newly created or revised guest VMs.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- SRG-OS-000324-VMM-001150
- Vuln IDs
-
- V-207445
- V-57091
- Rule IDs
-
- SV-207445r854618_rule
- SV-71351
Checks: C-7702r365745_chk
Verify the VMM prevents non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures. If it does not, this is a finding.
Fix: F-7702r365746_fix
Configure the VMM to prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002233
- Version
- SRG-OS-000326-VMM-001160
- Vuln IDs
-
- V-207446
- V-57093
- Rule IDs
-
- SV-207446r854619_rule
- SV-71353
Checks: C-7703r365748_chk
Verify the VMM prevents all software from executing at higher privilege levels than users executing the software. If it does not, this is a finding.
Fix: F-7703r365749_fix
Configure the VMM to prevent all software from executing at higher privilege levels than users executing the software.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002234
- Version
- SRG-OS-000327-VMM-001170
- Vuln IDs
-
- V-207447
- V-57095
- Rule IDs
-
- SV-207447r854620_rule
- SV-71355
Checks: C-7704r365751_chk
Verify the VMM audits the execution of privileged functions. If it does not, this is a finding.
Fix: F-7704r365752_fix
Configure the VMM to audit the execution of privileged functions.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-002238
- Version
- SRG-OS-000329-VMM-001180
- Vuln IDs
-
- V-207448
- V-57097
- Rule IDs
-
- SV-207448r854621_rule
- SV-71357
Checks: C-7705r365754_chk
Verify the VMM automatically locks an account until the locked account is released by an administrator, when three unsuccessful logon attempts in 15 minutes are made. If it does not, this is a finding.
Fix: F-7705r365755_fix
Configure the VMM to automatically lock an account until the locked account is released by an administrator, when three unsuccessful logon attempts in 15 minutes are made.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-001914
- Version
- SRG-OS-000337-VMM-001190
- Vuln IDs
-
- V-207449
- V-57099
- Rule IDs
-
- SV-207449r877036_rule
- SV-71359
Checks: C-7706r365757_chk
Verify the VMM provides the capability for assigned IMOs/ISSOs or designated SAs to change the auditing to be performed on all VMM components, based on all selectable event criteria in near real time. If it does not, this is a finding.
Fix: F-7706r365758_fix
Configure the VMM to provide the capability for assigned IMOs/ISSOs or designated SAs to change the auditing to be performed on all VMM components, based on all selectable event criteria in near real time.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- SRG-OS-000341-VMM-001220
- Vuln IDs
-
- V-207452
- V-57105
- Rule IDs
-
- SV-207452r854623_rule
- SV-71365
Checks: C-7709r365760_chk
Verify the VMM allocates audit record storage capacity to store at least one week's worth of audit records when audit records are not immediately sent to a central audit record storage facility. If it does not, this is a finding.
Fix: F-7709r365761_fix
Configure the VMM to allocate audit record storage capacity to store at least one week's worth of audit records when audit records are not immediately sent to a central audit record storage facility.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-OS-000342-VMM-001230
- Vuln IDs
-
- V-207453
- V-57107
- Rule IDs
-
- SV-207453r854624_rule
- SV-71367
Checks: C-7710r365763_chk
Verify the VMM off-loads audit records onto a different system or media than the system being audited. If it does not, this is a finding.
Fix: F-7710r365764_fix
Configure the VMM to off-load audit records onto a different system or media than the system being audited.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- SRG-OS-000343-VMM-001240
- Vuln IDs
-
- V-207454
- V-57109
- Rule IDs
-
- SV-207454r854625_rule
- SV-71369
Checks: C-7711r365766_chk
Verify the VMM provides an immediate warning to the SA and ISSO, at a minimum, when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity. If it does not, this is a finding.
Fix: F-7711r365767_fix
Configure the VMM to provide an immediate warning to the SA and ISSO, at a minimum, when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001858
- Version
- SRG-OS-000344-VMM-001250
- Vuln IDs
-
- V-207455
- V-57111
- Rule IDs
-
- SV-207455r854626_rule
- SV-71371
Checks: C-7712r365769_chk
Verify the VMM provides an immediate real-time alert to the SA and ISSO, at a minimum, of all audit failure events requiring real-time alerts. If it does not, this is a finding.
Fix: F-7712r365770_fix
Configure the VMM to provide an immediate real-time alert to the SA and ISSO, at a minimum, of all audit failure events requiring real-time alerts.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001875
- Version
- SRG-OS-000348-VMM-001260
- Vuln IDs
-
- V-207456
- V-57113
- Rule IDs
-
- SV-207456r854627_rule
- SV-71373
Checks: C-7713r365772_chk
Verify the VMM provides an audit reduction capability that supports on-demand audit review and analysis. If it does not, this is a finding.
Fix: F-7713r365773_fix
Configure the VMM to provide an audit reduction capability that supports on-demand audit review and analysis.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001877
- Version
- SRG-OS-000349-VMM-001270
- Vuln IDs
-
- V-207457
- V-57115
- Rule IDs
-
- SV-207457r854628_rule
- SV-71375
Checks: C-7714r365775_chk
Verify the VMM provides an audit reduction capability that supports after-the-fact investigations of security incidents. If it does not, this is a finding.
Fix: F-7714r365776_fix
Configure the VMM to provide an audit reduction capability that supports after-the-fact investigations of security incidents.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001878
- Version
- SRG-OS-000350-VMM-001280
- Vuln IDs
-
- V-207458
- V-57117
- Rule IDs
-
- SV-207458r854629_rule
- SV-71377
Checks: C-7715r365778_chk
Verify the VMM provides a report generation capability that supports on-demand audit review and analysis. If it does not, this is a finding.
Fix: F-7715r365779_fix
Ensure the VMM provides a report generation capability that supports on-demand audit review and analysis.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001879
- Version
- SRG-OS-000351-VMM-001290
- Vuln IDs
-
- V-207459
- V-57119
- Rule IDs
-
- SV-207459r854630_rule
- SV-71379
Checks: C-7716r365781_chk
Verify the VMM provides a report generation capability that supports on-demand reporting requirements. If it does not, this is a finding.
Fix: F-7716r365782_fix
Ensure the VMM provides a report generation capability that supports on-demand reporting requirements.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001880
- Version
- SRG-OS-000352-VMM-001300
- Vuln IDs
-
- V-207460
- V-57121
- Rule IDs
-
- SV-207460r854631_rule
- SV-71381
Checks: C-7717r365784_chk
Verify the VMM provides a report generation capability that supports after-the-fact investigations of security incidents. If it does not, this is a finding.
Fix: F-7717r365785_fix
Ensure the VMM provides a report generation capability that supports after-the-fact investigations of security incidents.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001881
- Version
- SRG-OS-000353-VMM-001310
- Vuln IDs
-
- V-207461
- V-57123
- Rule IDs
-
- SV-207461r854632_rule
- SV-71383
Checks: C-7718r365787_chk
Verify the VMM that provides an audit reduction capability does not alter original content or time ordering of audit records. If it does not, this is a finding.
Fix: F-7718r365788_fix
Configure the VMM that provides an audit reduction capability so that it does not alter original content or time ordering of audit records.
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-001882
- Version
- SRG-OS-000354-VMM-001320
- Vuln IDs
-
- V-207462
- V-57125
- Rule IDs
-
- SV-207462r854633_rule
- SV-71385
Checks: C-7719r365790_chk
Verify the VMM that provides a report generation capability does not alter original content or time ordering of audit records. If it does not, this is a finding.
Fix: F-7719r365791_fix
Configure the VMM that provides a report generation capability so that it does not alter original content or time ordering of audit records.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001891
- Version
- SRG-OS-000355-VMM-001330
- Vuln IDs
-
- V-207463
- V-57127
- Rule IDs
-
- SV-207463r878143_rule
- SV-71387
Checks: C-7720r878141_chk
Verify the VMM, for networked systems, compares internal information system clocks at least every 24 hours with a server which is synchronized to one of the redundant United States Naval Observatory (USNO) time servers or a time server designated for the appropriate DoD network (NIPRNet/SIPRNet), and/or the Global Positioning System (GPS). If it does not, this is a finding.
Fix: F-7720r878142_fix
Configure the VMM, for networked systems, to compare internal information system clocks at least every 24 hours with a server which is synchronized to one of the redundant United States Naval Observatory (USNO) time servers or a time server designated for the appropriate DoD network (NIPRNet/SIPRNet), and/or the Global Positioning System (GPS).
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-002046
- Version
- SRG-OS-000356-VMM-001340
- Vuln IDs
-
- V-207464
- V-57129
- Rule IDs
-
- SV-207464r854637_rule
- SV-71389
Checks: C-7721r365796_chk
Verify the VMM synchronizes internal information system clocks to the authoritative time source when the time difference is greater than one second. If it does not, this is a finding.
Fix: F-7721r365797_fix
Configure the VMM to synchronize internal information system clocks to the authoritative time source when the time difference is greater than one second.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001889
- Version
- SRG-OS-000358-VMM-001350
- Vuln IDs
-
- V-207465
- V-57131
- Rule IDs
-
- SV-207465r854638_rule
- SV-71391
Checks: C-7722r365799_chk
Verify the VMM records time stamps for audit records that meet a granularity of one second for a minimum degree of precision. If it does not, this is a finding.
Fix: F-7722r365800_fix
Configure the VMM to record time stamps for audit records that meet a granularity of one second for a minimum degree of precision.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001890
- Version
- SRG-OS-000359-VMM-001360
- Vuln IDs
-
- V-207466
- V-57133
- Rule IDs
-
- SV-207466r854639_rule
- SV-71393
Checks: C-7723r365802_chk
Verify the VMM records time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT). If it does not, this is a finding.
Fix: F-7723r365803_fix
Configure the VMM to record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-OS-000360-VMM-001370
- Vuln IDs
-
- V-207467
- V-57135
- Rule IDs
-
- SV-207467r854640_rule
- SV-71395
Checks: C-7724r365805_chk
Verify the VMM enforces dual authorization for movement and/or deletion of all audit information, when such movement or deletion is not part of an authorized automatic process. If it does not, this is a finding.
Fix: F-7724r365806_fix
Configure the VMM to enforce dual authorization for movement and/or deletion of all audit information, when such movement or deletion is not part of an authorized automatic process.
- RMF Control
- CM-11
- Severity
- M
- CCI
- CCI-001812
- Version
- SRG-OS-000362-VMM-001390
- Vuln IDs
-
- V-207468
- V-57137
- Rule IDs
-
- SV-207468r854641_rule
- SV-71397
Checks: C-7725r365808_chk
Verify the VMM prohibits user installation of software or guest VMs without explicit privileged status. If it does not, this is a finding.
Fix: F-7725r365809_fix
Configure the VMM to prohibit user installation of software or guest VMs without explicit privileged status.
- RMF Control
- CM-3
- Severity
- M
- CCI
- CCI-001744
- Version
- SRG-OS-000363-VMM-001400
- Vuln IDs
-
- V-207469
- V-57139
- Rule IDs
-
- SV-207469r854642_rule
- SV-71399
Checks: C-7726r365811_chk
Verify the VMM notifies designated personnel if baseline configurations are changed in an unauthorized manner. If it does not, this is a finding.
Fix: F-7726r365812_fix
Configure the VMM to notify designated personnel if baseline configurations are changed in an unauthorized manner.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- SRG-OS-000364-VMM-001410
- Vuln IDs
-
- V-207470
- V-57141
- Rule IDs
-
- SV-207470r854643_rule
- SV-71401
Checks: C-7727r365814_chk
Verify the VMM enforces access restrictions associated with changes to the system. If it does not, this is a finding.
Fix: F-7727r365815_fix
Configure the VMM to enforce access restrictions associated with changes to the system.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001814
- Version
- SRG-OS-000365-VMM-001420
- Vuln IDs
-
- V-207471
- V-57143
- Rule IDs
-
- SV-207471r854644_rule
- SV-71403
Checks: C-7728r365817_chk
Verify the VMM audits the enforcement actions used to restrict access associated with changes to the system. If it does not, this is a finding.
Fix: F-7728r365818_fix
Configure the VMM to audit the enforcement actions used to restrict access associated with changes to the system.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- SRG-OS-000366-VMM-001430
- Vuln IDs
-
- V-207472
- V-57145
- Rule IDs
-
- SV-207472r878138_rule
- SV-71405
Checks: C-7729r878137_chk
Verify the VMM prevents the installation of guest VMs, patches, service packs, device drivers, or VMM components without verification they have been digitally signed using a certificate that is recognized and approved by the organization. If it does not, this is a finding.
Fix: F-7729r365821_fix
Configure the VMM to prevent the installation of guest VMs, patches, service packs, device drivers, or VMM components without verification they have been digitally signed using a certificate that is recognized and approved by the organization.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- SRG-OS-000368-VMM-001440
- Vuln IDs
-
- V-207473
- V-57147
- Rule IDs
-
- SV-207473r854647_rule
- SV-71407
Checks: C-7730r365823_chk
Verify the VMM prevents use of service and helper VMs not required to support proper VMM function. If it does not, this is a finding.
Fix: F-7730r365824_fix
Configure the VMM to prevent use of service and helper VMs not required to support proper VMM function.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- SRG-OS-000368-VMM-001450
- Vuln IDs
-
- V-207474
- V-57149
- Rule IDs
-
- SV-207474r854648_rule
- SV-71409
Checks: C-7731r365826_chk
Verify the VMM prevents inappropriate use of redundant guest VMs. If it does not, this is a finding.
Fix: F-7731r365827_fix
Configure the VMM to prevent inappropriate use of redundant guest VMs.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001774
- Version
- SRG-OS-000370-VMM-001460
- Vuln IDs
-
- V-207475
- V-57151
- Rule IDs
-
- SV-207475r854649_rule
- SV-71411
Checks: C-7732r365829_chk
Verify the VMM employs a deny-all, permit-by-exception policy to allow the execution of authorized software programs and guest VMs. If it does not, this is a finding.
Fix: F-7732r365830_fix
Configure the VMM to employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs and guest VMs.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- SRG-OS-000373-VMM-001470
- Vuln IDs
-
- V-207476
- V-57153
- Rule IDs
-
- SV-207476r854650_rule
- SV-71413
Checks: C-7733r365832_chk
Verify the VMM requires users to re-authenticate for privilege escalation. If it does not, this is a finding.
Fix: F-7733r365833_fix
Configure the VMM to require users to re-authenticate for privilege escalation.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- SRG-OS-000373-VMM-001480
- Vuln IDs
-
- V-207477
- V-57155
- Rule IDs
-
- SV-207477r854651_rule
- SV-71415
Checks: C-7734r365835_chk
Verify the VMM requires users to re-authenticate when changing roles. If it does not, this is a finding.
Fix: F-7734r365836_fix
Configure the VMM to require users to re-authenticate when changing roles.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- SRG-OS-000373-VMM-001490
- Vuln IDs
-
- V-207478
- V-57157
- Rule IDs
-
- SV-207478r854652_rule
- SV-71417
Checks: C-7735r365838_chk
Verify the VMM requires users to re-authenticate when changing authenticators. If it does not, this is a finding.
Fix: F-7735r365839_fix
Configure the VMM to require users to re-authenticate when changing authenticators.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002039
- Version
- SRG-OS-000374-VMM-001500
- Vuln IDs
-
- V-207479
- V-57159
- Rule IDs
-
- SV-207479r854653_rule
- SV-71419
Checks: C-7736r365841_chk
Verify the VMM requires devices to re-authenticate when changing authenticators. If it does not, this is a finding.
Fix: F-7736r365842_fix
Configure the VMM to require devices to re-authenticate when changing authenticators.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001948
- Version
- SRG-OS-000375-VMM-001510
- Vuln IDs
-
- V-207480
- V-57161
- Rule IDs
-
- SV-207480r854654_rule
- SV-71421
Checks: C-7737r365844_chk
Verify the VMM implements multifactor authentication for remote access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access. If it does not, this is a finding.
Fix: F-7737r365845_fix
Configure the VMM to implement multifactor authentication for remote access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001953
- Version
- SRG-OS-000376-VMM-001520
- Vuln IDs
-
- V-207481
- V-57163
- Rule IDs
-
- SV-207481r854655_rule
- SV-71423
Checks: C-7738r365847_chk
Verify the VMM accepts Personal Identity Verification (PIV) credentials. If it does not, this is a finding.
Fix: F-7738r365848_fix
Configure the VMM to accept Personal Identity Verification (PIV) credentials.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001954
- Version
- SRG-OS-000377-VMM-001530
- Vuln IDs
-
- V-207482
- V-57165
- Rule IDs
-
- SV-207482r854656_rule
- SV-71425
Checks: C-7739r365850_chk
Verify the VMM electronically verifies Personal Identity Verification (PIV) credentials. If it does not, this is a finding.
Fix: F-7739r365851_fix
Configure the VMM to electronically verify Personal Identity Verification (PIV) credentials.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001958
- Version
- SRG-OS-000378-VMM-001540
- Vuln IDs
-
- V-207483
- V-57167
- Rule IDs
-
- SV-207483r854657_rule
- SV-71427
Checks: C-7740r365853_chk
Verify the VMM authenticates peripherals before establishing a connection. If it does not, this is a finding.
Fix: F-7740r365854_fix
Configure the VMM to authenticate peripherals before establishing a connection.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- SRG-OS-000379-VMM-001550
- Vuln IDs
-
- V-207484
- V-57269
- Rule IDs
-
- SV-207484r877039_rule
- SV-71529
Checks: C-7741r365856_chk
Verify the VMM authenticates all endpoint devices before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based. If it does not, this is a finding.
Fix: F-7741r365857_fix
Configure the VMM to authenticate all endpoint devices before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002041
- Version
- SRG-OS-000380-VMM-001560
- Vuln IDs
-
- V-207485
- V-57271
- Rule IDs
-
- SV-207485r854659_rule
- SV-71531
Checks: C-7742r365859_chk
Verify the VMM allows the use of a temporary password for system logons with an immediate change to a permanent password. If it does not, this is a finding.
Fix: F-7742r365860_fix
Configure the VMM to allow the use of a temporary password for system logons with an immediate change to a permanent password.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002007
- Version
- SRG-OS-000383-VMM-001570
- Vuln IDs
-
- V-207486
- V-57273
- Rule IDs
-
- SV-207486r854660_rule
- SV-71533
Checks: C-7743r365862_chk
Verify the VMM prohibits the use of cached authenticators after one day. If it does not, this is a finding.
Fix: F-7743r365863_fix
Configure the VMM to prohibit the use of cached authenticators after one day.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-001991
- Version
- SRG-OS-000384-VMM-001580
- Vuln IDs
-
- V-207487
- V-57275
- Rule IDs
-
- SV-207487r854661_rule
- SV-71535
Checks: C-7744r365865_chk
Verify the VMM, for PKI-based authentication, implements a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network. If it does not, this is a finding.
Fix: F-7744r365866_fix
Configure the VMM, for PKI-based authentication, to implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-OS-000396-VMM-001590
- Vuln IDs
-
- V-207488
- V-57277
- Rule IDs
-
- SV-207488r854662_rule
- SV-71537
Checks: C-7745r365868_chk
Verify the VMM implements NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards. If it does not, this is a finding.
Fix: F-7745r365869_fix
Configure the VMM to implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
- RMF Control
- SC-21
- Severity
- M
- CCI
- CCI-002465
- Version
- SRG-OS-000399-VMM-001600
- Vuln IDs
-
- V-207489
- V-57279
- Rule IDs
-
- SV-207489r854663_rule
- SV-71539
Checks: C-7746r365871_chk
Verify the VMM requests data origin authentication verification on the name/address resolution responses the system receives from authoritative sources. If it does not, this is a finding.
Fix: F-7746r365872_fix
Configure the VMM to request data origin authentication verification on the name/address resolution responses the system receives from authoritative sources.
- RMF Control
- SC-21
- Severity
- M
- CCI
- CCI-002466
- Version
- SRG-OS-000400-VMM-001610
- Vuln IDs
-
- V-207490
- V-57281
- Rule IDs
-
- SV-207490r854664_rule
- SV-71541
Checks: C-7747r365874_chk
Verify the VMM requests data integrity verification on the name/address resolution responses the system receives from authoritative sources. If it does not, this is a finding.
Fix: F-7747r365875_fix
Configure the VMM to request data integrity verification on the name/address resolution responses the system receives from authoritative sources.
- RMF Control
- SC-21
- Severity
- M
- CCI
- CCI-002467
- Version
- SRG-OS-000401-VMM-001620
- Vuln IDs
-
- V-207491
- V-57283
- Rule IDs
-
- SV-207491r854665_rule
- SV-71543
Checks: C-7748r365877_chk
Verify the VMM performs data integrity verification on the name/address resolution responses the system receives from authoritative sources. If it does not, this is a finding.
Fix: F-7748r365878_fix
Configure the VMM to perform data integrity verification on the name/address resolution responses the system receives from authoritative sources.
- RMF Control
- SC-21
- Severity
- M
- CCI
- CCI-002468
- Version
- SRG-OS-000402-VMM-001630
- Vuln IDs
-
- V-207492
- V-57285
- Rule IDs
-
- SV-207492r854666_rule
- SV-71545
Checks: C-7749r365880_chk
Verify the VMM performs data origin verification authentication on the name/address resolution responses the system receives from authoritative sources. If it does not, this is a finding.
Fix: F-7749r365881_fix
Configure the VMM to perform data origin verification authentication on the name/address resolution responses the system receives from authoritative sources.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-002470
- Version
- SRG-OS-000403-VMM-001640
- Vuln IDs
-
- V-207493
- V-57287
- Rule IDs
-
- SV-207493r854667_rule
- SV-71547
Checks: C-7750r365883_chk
Verify the VMM only allows the use of DoD PKI-established certificate authorities for verification of the establishment of protected sessions. If it does not, this is a finding.
Fix: F-7750r365884_fix
Configure the VMM to only allow the use of DoD PKI-established certificate authorities for verification of the establishment of protected sessions.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002475
- Version
- SRG-OS-000404-VMM-001650
- Vuln IDs
-
- V-207494
- V-57289
- Rule IDs
-
- SV-207494r854668_rule
- SV-71549
Checks: C-7751r365886_chk
Verify the VMM implements cryptographic mechanisms to prevent unauthorized modification of all information at rest on all VMM components. If it does not, this is a finding.
Fix: F-7751r365887_fix
Configure the VMM to implement cryptographic mechanisms to prevent unauthorized modification of all information at rest on all VMM components.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002476
- Version
- SRG-OS-000405-VMM-001660
- Vuln IDs
-
- V-207495
- V-57291
- Rule IDs
-
- SV-207495r854669_rule
- SV-71551
Checks: C-7752r365889_chk
Verify the VMM implements cryptographic mechanisms to prevent unauthorized disclosure of all information at rest on all VMM components. If it does not, this is a finding.
Fix: F-7752r365890_fix
Configure the VMM to implement cryptographic mechanisms to prevent unauthorized disclosure of all information at rest on all VMM components.
- RMF Control
- SC-39
- Severity
- M
- CCI
- CCI-002530
- Version
- SRG-OS-000408-VMM-001670
- Vuln IDs
-
- V-207496
- V-57293
- Rule IDs
-
- SV-207496r854670_rule
- SV-71553
Checks: C-7753r365892_chk
Verify the VMM maintains a separate execution domain for each executing process. If it does not, this is a finding.
Fix: F-7753r365893_fix
Configure the VMM to maintain a separate execution domain for each executing process.
- RMF Control
- SC-39
- Severity
- M
- CCI
- CCI-002530
- Version
- SRG-OS-000408-VMM-001680
- Vuln IDs
-
- V-207497
- V-57295
- Rule IDs
-
- SV-207497r854671_rule
- SV-71555
Checks: C-7754r365895_chk
Verify the VMM maintains a separate execution domain for each guest VM. If it does not, this is a finding.
Fix: F-7754r365896_fix
Configure the VMM to maintain a separate execution domain for each guest VM.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-OS-000420-VMM-001690
- Vuln IDs
-
- V-207498
- V-57297
- Rule IDs
-
- SV-207498r854672_rule
- SV-71557
Checks: C-7755r365898_chk
Verify the VMM protects against or limit the effects of Denial of Service (DoS) attacks by ensuring the VMM is implementing rate-limiting measures on impacted network interfaces. If it does not, this is a finding.
Fix: F-7755r365899_fix
Configure the VMM to protect against or limit the effects of Denial of Service (DoS) attacks by ensuring the VMM is implementing rate-limiting measures on impacted network interfaces.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-OS-000423-VMM-001700
- Vuln IDs
-
- V-207499
- V-57299
- Rule IDs
-
- SV-207499r854673_rule
- SV-71559
Checks: C-7756r365901_chk
Verify the VMM protects the confidentiality and integrity of transmitted information. If it does not, this is a finding.
Fix: F-7756r365902_fix
Configure the VMM to protect the confidentiality and integrity of transmitted information.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002420
- Version
- SRG-OS-000425-VMM-001710
- Vuln IDs
-
- V-207500
- V-57301
- Rule IDs
-
- SV-207500r854674_rule
- SV-71561
Checks: C-7757r365904_chk
Verify the VMM maintains the confidentiality and integrity of information during preparation for transmission. If it does not, this is a finding.
Fix: F-7757r365905_fix
Configure the VMM to maintain the confidentiality and integrity of information during preparation for transmission.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002422
- Version
- SRG-OS-000426-VMM-001720
- Vuln IDs
-
- V-207501
- V-57303
- Rule IDs
-
- SV-207501r854675_rule
- SV-71563
Checks: C-7758r365907_chk
Verify the VMM maintains the confidentiality and integrity of information during reception. If it does not, this is a finding.
Fix: F-7758r365908_fix
Configure the VMM to maintain the confidentiality and integrity of information during reception.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-002754
- Version
- SRG-OS-000432-VMM-001730
- Vuln IDs
-
- V-207502
- V-57305
- Rule IDs
-
- SV-207502r854676_rule
- SV-71565
Checks: C-7759r365910_chk
Verify the VMM behaves in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received. If it does not, this is a finding.
Fix: F-7759r365911_fix
Ensure the VMM behaves in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.
- RMF Control
- SI-16
- Severity
- M
- CCI
- CCI-002824
- Version
- SRG-OS-000433-VMM-001740
- Vuln IDs
-
- V-207503
- V-57307
- Rule IDs
-
- SV-207503r854677_rule
- SV-71567
Checks: C-7760r365913_chk
Verify the VMM implements non-executable data to protect its memory from unauthorized code execution. If it does not, this is a finding.
Fix: F-7760r365914_fix
Configure the VMM to implement non-executable data to protect its memory from unauthorized code execution.
- RMF Control
- SI-16
- Severity
- M
- CCI
- CCI-002824
- Version
- SRG-OS-000433-VMM-001750
- Vuln IDs
-
- V-207504
- V-57309
- Rule IDs
-
- SV-207504r854678_rule
- SV-71569
Checks: C-7761r365916_chk
Verify the VMM implements address space layout randomization to protect its memory from unauthorized code execution. If it does not, this is a finding.
Fix: F-7761r365917_fix
Configure the VMM to implement address space layout randomization to protect its memory from unauthorized code execution.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002617
- Version
- SRG-OS-000437-VMM-001760
- Vuln IDs
-
- V-207505
- V-57311
- Rule IDs
-
- SV-207505r854679_rule
- SV-71571
Checks: C-7762r365919_chk
Verify the VMM removes all software components after updated versions have been installed. If it does not, this is a finding.
Fix: F-7762r365920_fix
Configure the VMM to remove all software components after updated versions have been installed.
- RMF Control
- SI-6
- Severity
- M
- CCI
- CCI-002696
- Version
- SRG-OS-000445-VMM-001780
- Vuln IDs
-
- V-207506
- V-57313
- Rule IDs
-
- SV-207506r854680_rule
- SV-71573
Checks: C-7763r365922_chk
Verify the VMM verifies correct operation of all security functions. If it does not, this is a finding.
Fix: F-7763r365923_fix
Configure the VMM to verify correct operation of all security functions.
- RMF Control
- SI-6
- Severity
- M
- CCI
- CCI-002699
- Version
- SRG-OS-000446-VMM-001790
- Vuln IDs
-
- V-207507
- V-57315
- Rule IDs
-
- SV-207507r854681_rule
- SV-71575
Checks: C-7764r365925_chk
Verify the VMM performs verification of the correct operation of security functions: upon system startup and/or restart; upon command by a user with privileged access; and/or every 30 days. If it does not, this is a finding.
Fix: F-7764r365926_fix
Configure the VMM to perform verification of the correct operation of security functions: upon system startup and/or restart; upon command by a user with privileged access; and/or every 30 days.
- RMF Control
- SI-6
- Severity
- M
- CCI
- CCI-002702
- Version
- SRG-OS-000447-VMM-001800
- Vuln IDs
-
- V-207508
- V-57317
- Rule IDs
-
- SV-207508r854682_rule
- SV-71577
Checks: C-7765r365928_chk
Verify the VMM shuts down, restarts, and/or notifies the system administrator when anomalies in the operation of any security functions are discovered. If it does not, this is a finding.
Fix: F-7765r365929_fix
Configure the VMM to shut down, restart, and/or notify the system administrator when anomalies in the operation of any security functions are discovered.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000458-VMM-001810
- Vuln IDs
-
- V-207509
- V-57319
- Rule IDs
-
- SV-207509r380329_rule
- SV-71579
Checks: C-7766r365931_chk
Verify the VMM generates audit records when successful/unsuccessful attempts to access security objects occur. If it does not, this is a finding.
Fix: F-7766r365932_fix
Configure the VMM to generate audit records when successful/unsuccessful attempts to access security objects occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000460-VMM-001820
- Vuln IDs
-
- V-207510
- V-57321
- Rule IDs
-
- SV-207510r380332_rule
- SV-71581
Checks: C-7767r365934_chk
Verify the VMM generates audit records when successful/unsuccessful attempts to access security levels occur. If it does not, this is a finding.
Fix: F-7767r365935_fix
Configure the VMM to generate audit records when successful/unsuccessful attempts to access security levels occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000461-VMM-001830
- Vuln IDs
-
- V-207511
- V-57323
- Rule IDs
-
- SV-207511r380335_rule
- SV-71583
Checks: C-7768r365937_chk
Verify the VMM generates audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur. If it does not, this is a finding.
Fix: F-7768r365938_fix
Configure the VMM to generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000462-VMM-001840
- Vuln IDs
-
- V-207512
- V-57325
- Rule IDs
-
- SV-207512r381448_rule
- SV-71585
Checks: C-7769r365940_chk
Verify the VMM generates audit records when successful/unsuccessful attempts to modify privileges occur. If it does not, this is a finding.
Fix: F-7769r365941_fix
Configure the VMM to generate audit records when successful/unsuccessful attempts to modify privileges occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000463-VMM-001850
- Vuln IDs
-
- V-207513
- V-57327
- Rule IDs
-
- SV-207513r381451_rule
- SV-71587
Checks: C-7770r365943_chk
Verify the VMM generates audit records when successful/unsuccessful attempts to modify security objects occur. If it does not, this is a finding.
Fix: F-7770r365944_fix
Configure the VMM to generate audit records when successful/unsuccessful attempts to modify security objects occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000464-VMM-001860
- Vuln IDs
-
- V-207514
- V-57329
- Rule IDs
-
- SV-207514r381454_rule
- SV-71589
Checks: C-7771r365946_chk
Verify the VMM generates audit records when successful/unsuccessful attempts to modify security levels occur. If it does not, this is a finding.
Fix: F-7771r365947_fix
Configure the VMM to generate audit records when successful/unsuccessful attempts to modify security levels occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000466-VMM-001870
- Vuln IDs
-
- V-207515
- V-57331
- Rule IDs
-
- SV-207515r381460_rule
- SV-71591
Checks: C-7772r365949_chk
Verify the VMM generates audit records when successful/unsuccessful attempts to delete privileges occur. If it does not, this is a finding.
Fix: F-7772r365950_fix
Configure the VMM to generate audit records when successful/unsuccessful attempts to delete privileges occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000467-VMM-001880
- Vuln IDs
-
- V-207516
- V-57333
- Rule IDs
-
- SV-207516r381463_rule
- SV-71593
Checks: C-7773r365952_chk
Verify the VMM generates audit records when successful/unsuccessful attempts to delete security levels occur. If it does not, this is a finding.
Fix: F-7773r365953_fix
Configure the VMM to generate audit records when successful/unsuccessful attempts to delete security levels occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000468-VMM-001890
- Vuln IDs
-
- V-207517
- V-57335
- Rule IDs
-
- SV-207517r381466_rule
- SV-71595
Checks: C-7774r365955_chk
Verify the VMM generates audit records when successful/unsuccessful attempts to delete security objects occur. If it does not, this is a finding.
Fix: F-7774r365956_fix
Configure the VMM to generate audit records when successful/unsuccessful attempts to delete security objects occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000470-VMM-001900
- Vuln IDs
-
- V-207518
- V-57337
- Rule IDs
-
- SV-207518r381472_rule
- SV-71597
Checks: C-7775r365958_chk
Verify the VMM generates audit records when successful/unsuccessful logon attempts occur. If it does not, this is a finding.
Fix: F-7775r365959_fix
Configure the VMM to generate audit records when successful/unsuccessful logon attempts occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000471-VMM-001910
- Vuln IDs
-
- V-207519
- V-57339
- Rule IDs
-
- SV-207519r381475_rule
- SV-71599
Checks: C-7776r365961_chk
Verify the VMM generates audit records for privileged activities or other system-level access. If it does not, this is a finding.
Fix: F-7776r365962_fix
Configure the VMM to generate audit records for privileged activities or other system-level access.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000472-VMM-001920
- Vuln IDs
-
- V-207520
- V-57341
- Rule IDs
-
- SV-207520r381478_rule
- SV-71601
Checks: C-7777r365964_chk
Verify the VMM generates audit records showing starting and ending time for user access to the system. If it does not, this is a finding.
Fix: F-7777r365965_fix
Configure the VMM to generate audit records showing starting and ending time for user access to the system.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000473-VMM-001930
- Vuln IDs
-
- V-207521
- V-57343
- Rule IDs
-
- SV-207521r381481_rule
- SV-71603
Checks: C-7778r365967_chk
Verify the VMM generates audit records when concurrent logons from different workstations occur. If it does not, this is a finding.
Fix: F-7778r365968_fix
Configure the VMM to generate audit records when concurrent logons from different workstations occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000474-VMM-001940
- Vuln IDs
-
- V-207522
- V-57345
- Rule IDs
-
- SV-207522r381484_rule
- SV-71605
Checks: C-7779r365970_chk
Verify the VMM generates audit records when successful/unsuccessful accesses to objects occur. If it does not, this is a finding.
Fix: F-7779r365971_fix
Configure the VMM to generate audit records when successful/unsuccessful accesses to objects occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000475-VMM-001950
- Vuln IDs
-
- V-207523
- V-57347
- Rule IDs
-
- SV-207523r381487_rule
- SV-71607
Checks: C-7780r365973_chk
Verify the VMM generates audit records for all direct access to the VMM. If it does not, this is a finding.
Fix: F-7780r365974_fix
Configure the VMM to generate audit records for all direct access to the VMM.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000476-VMM-001960
- Vuln IDs
-
- V-207524
- V-57349
- Rule IDs
-
- SV-207524r381490_rule
- SV-71609
Checks: C-7781r365976_chk
Verify the VMM generates audit records for all account creations, modifications, disabling, and termination events. If it does not, this is a finding.
Fix: F-7781r365977_fix
Configure the VMM to generate audit records for all account creations, modifications, disabling, and termination events.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-OS-000477-VMM-001970
- Vuln IDs
-
- V-207525
- V-57351
- Rule IDs
-
- SV-207525r381493_rule
- SV-71611
Checks: C-7782r365979_chk
Verify the VMM generates audit records for all module load, unload, and restart actions, and also for all program and guest VM initiations. If it does not, this is a finding.
Fix: F-7782r365980_fix
Configure the VMM to generate audit records for all module load, unload, and restart actions, and also for all program and guest VM initiations.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-OS-000478-VMM-001980
- Vuln IDs
-
- V-207526
- V-57353
- Rule IDs
-
- SV-207526r878146_rule
- SV-71613
Checks: C-7783r878144_chk
Verify the VMM implements NIST FIPS-validated cryptography for the following: to provision digital signatures; to generate cryptographic hashes; and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards. If it does not, this is a finding.
Fix: F-7783r878145_fix
Configure the VMM to implement NIST FIPS-validated cryptography for the following: to provision digital signatures; to generate cryptographic hashes; and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-OS-000479-VMM-001990
- Vuln IDs
-
- V-207527
- V-57355
- Rule IDs
-
- SV-207527r854686_rule
- SV-71615
Checks: C-7784r365985_chk
Verify the VMM, at a minimum, off-loads interconnected systems in real time and off-loads standalone systems weekly. If it does not, this is a finding.
Fix: F-7784r365986_fix
Configure the VMM to, at a minimum, off-load interconnected systems in real time and off-load standalone systems weekly.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-OS-000480-VMM-002000
- Vuln IDs
-
- V-207528
- V-57357
- Rule IDs
-
- SV-207528r388482_rule
- SV-71617
Checks: C-7785r365988_chk
Verify the VMM is configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs. If it does not, this is a finding.
Fix: F-7785r365989_fix
Configure the VMM to be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-OS-000481-VMM-002010
- Vuln IDs
-
- V-207529
- V-64707
- Rule IDs
-
- SV-207529r916433_rule
- SV-79197
Checks: C-7786r365991_chk
Verify the VMM protects the confidentiality and integrity of communications with wireless peripherals. If it does not, this is a finding.
Fix: F-7786r365992_fix
Configure the VMM to protect the confidentiality and integrity of communications with wireless peripherals.