Select any two versions of this STIG to compare the individual requirements
Select any old version/release of this STIG to view the previous requirements
Verify the VMM provides automated mechanisms for supporting account management functions. If it does not, this is a finding.
Configure the VMM to provide automated mechanisms for supporting account management functions.
Verify the VMM automatically removes or disables local temporary user accounts after 72 hours. If it does not, this is a finding.
Configure the VMM to automatically remove or disable local temporary user accounts after 72 hours.
Verify the VMM automatically disables local accounts after a 35-day period of account inactivity. If it does not, this is a finding.
Configure the VMM to automatically disable local accounts after a 35-day period of account inactivity.
Verify the VMM automatically audits account creation. If it does not, this is a finding.
Configure the VMM to automatically audit account creation.
Verify the VMM enforces the limit of three consecutive invalid logon attempts by a user during a 15-minute time period. If it does not, this is a finding.
Configure the VMM to enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period, by locking the account.
Verify the VMM displays the Standard Mandatory DoD Notice and Consent Banner before granting access to the system. If it does not, this is a finding. The banner must be formatted in accordance with applicable DoD policy. Use the following verbiage for a VMM that can accommodate banners of 1300 characters: "You are accessing a U.S. Government (USG) VMM (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." Use the following verbiage for VMMs that have severe limitations on the number of characters that can be displayed in the banner: "I've read & consent to terms in IS user agreem't."
Configure the VMM to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system. The banner must be formatted in accordance with applicable DoD policy. Use the following verbiage for a VMM that can accommodate banners of 1300 characters: "You are accessing a U.S. Government (USG) VMM (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." Use the following verbiage for VMMs that have severe limitations on the number of characters that can be displayed in the banner: "I've read & consent to terms in IS user agreem't."
Verify the VMM retains the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access. If it does not, this is a finding.
Configure the VMM to retain the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access.
Verify the VMM limits the number of concurrent sessions to ten for all accounts and/or account types. If it does not, this is a finding.
Configure the VMM to limit the number of concurrent sessions to ten for all accounts and/or account types.
Verify the VMM retains the session lock until the user reestablishes access using established identification and authentication procedures. If it does not, this is a finding.
Configure the VMM to retain the session lock until the user reestablishes access using established identification and authentication procedures.
Verify the VMM initiates a session lock after a 15-minute period of inactivity. If it does not, this is a finding.
Configure the VMM to initiate a session lock after a 15-minute period of inactivity.
Verify the VMM provides the capability for users to directly initiate a session lock. If it does not, this is a finding.
Configure the VMM to provide the capability for users to directly initiate a session lock.
Verify the VMM conceals, via the session lock, information previously visible on the display with a publicly viewable image. If it does not, this is a finding.
Configure the VMM to conceal, via the session lock, information previously visible on the display with a publicly viewable image.
Verify the VMM monitors remote access methods automatically. If it does not, this is a finding.
Configure the VMM to monitor remote access methods automatically.
Verify the VMM uses DoD-approved encryption to protect the confidentiality of remote access sessions. If it does not, this is a finding.
Configure the VMM to use DoD-approved encryption to protect the confidentiality of remote access sessions.
Verify the VMM produces audit records containing information to establish what type of events occurred. If it does not, this is a finding.
Configure the VMM to produce audit records containing information to establish what type of events occurred.
Verify the VMM produces audit records containing information to establish when (date and time) the events occurred. If it does not, this is a finding.
Configure the VMM to produce audit records containing information to establish when (date and time) the events occurred.
Verify the VMM produces audit records containing information to establish where the events occurred. If it does not, this is a finding.
Configure the VMM to produce audit records containing information to establish where the events occurred.
Verify the VMM produces audit records containing information to establish the source of the events. If it does not, this is a finding.
Configure the VMM to produce audit records containing information to establish the source of the events.
Verify the VMM produces audit records containing information to establish the outcome of the events. If it does not, this is a finding.
Configure the VMM to produce audit records containing information to establish the outcome of the events.
Verify the VMM generates audit records containing the full-text recording of privileged commands or the individual identities of group account users. If it does not, this is a finding.
Configure the VMM to generate audit records containing the full-text recording of privileged commands or the individual identities of group account users.
Verify the VMM alerts the ISSO and SA (at a minimum) in the event of an audit processing failure. If it does not, this is a finding.
Configure the VMM to alert the ISSO and SA (at a minimum) in the event of an audit processing failure.
Verify the VMM shuts down by default upon audit failure (unless availability is an overriding concern). If it does not, this is a finding.
Configure the VMM to shut down by default upon audit failure (unless availability is an overriding concern).
Verify the VMM supports the capability to centrally review and analyze audit records from multiple components within the system. If it does not, this is a finding.
Configure the VMM to support the capability to centrally review and analyze audit records from multiple components within the system.
Verify the VMM supports the capability to filter audit records for events of interest based upon all audit fields within audit records. If it does not, this is a finding.
Configure the VMM to support the capability to filter audit records for events of interest based upon all audit fields within audit records.
Verify the VMM uses internal system clocks to generate time stamps for audit records. If it does not, this is a finding.
Configure the VMM to use internal system clocks to generate time stamps for audit records.
Verify the VMM protects audit information from unauthorized read access. If it does not, this is a finding.
Configure the VMM to protect audit information from unauthorized read access.
Verify the VMM protects audit information from unauthorized modification. If it does not, this is a finding.
Configure the VMM to protect audit information from unauthorized modification.
Verify the VMM protects audit information from unauthorized deletion. If it does not, this is a finding.
Configure the VMM to protect audit information from unauthorized deletion.
Verify the VMM provides audit record generation capability for DoD-defined auditable events for all VMM components. If it does not, this is a finding. DoD has defined the list of events for which the VMM will provide an audit record generation capability as the following: (i) Successful and unsuccessful attempts to access, modify, or delete privileges, security objects, security levels, or categories of information (e.g., classification levels); (ii) Access actions, such as successful and unsuccessful logon attempts, privileged activities or other system level access, starting and ending time for user access to the system, concurrent logons from different workstations, successful and unsuccessful accesses to objects, all program initiations, and all direct access to the VMM; (iii) All account creations, modifications, disabling, and terminations; and (iv) All kernel module load, unload, and restart actions.
Configure the VMM to provide audit record generation capability for DoD-defined auditable events for all VMM components. DoD has defined the list of events for which the VMM will provide an audit record generation capability as the following: (i) Successful and unsuccessful attempts to access, modify, or delete privileges, security objects, security levels, or categories of information (e.g., classification levels); (ii) Access actions, such as successful and unsuccessful logon attempts, privileged activities or other system level access, starting and ending time for user access to the system, concurrent logons from different workstations, successful and unsuccessful accesses to objects, all program initiations, and all direct access to the VMM; (iii) All account creations, modifications, disabling, and terminations; and (iv) All kernel module load, unload, and restart actions.
Verify the VMM allows only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited. If it does not, this is a finding.
Configure the VMM to allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
Verify the VMM generates audit records when successful/unsuccessful attempts to access privileges occur. If it does not, this is a finding.
Configure the VMM to generate audit records when successful/unsuccessful attempts to access privileges occur.
Verify the VMM, for PKI-based authentication, validates certificates by constructing a certification path (which includes status information) to an accepted trust anchor. If it does not, this is a finding.
Configure the VMM, for PKI-based authentication, to validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.
Verify the VMM, for PKI-based authentication, enforces authorized access to the corresponding private key. If it does not, this is a finding.
Configure the VMM, for PKI-based authentication, to enforce authorized access to the corresponding private key.
Verify the VMM maps the authenticated identity to the user or group account for PKI-based authentication. If it does not, this is a finding.
Configure the VMM to map the authenticated identity to the user or group account for PKI-based authentication.
Verify the VMM enforces password complexity by requiring that at least one uppercase character be used. If it does not, this is a finding.
Configure the VMM to enforce password complexity by requiring that at least one uppercase character be used.
Verify the VMM enforces password complexity by requiring that at least one lowercase character be used. If it does not, this is a finding.
Configure the VMM to enforce password complexity by requiring that at least one lowercase character be used.
Verify the VMM enforces password complexity by requiring that at least one numeric character be used. If it does not, this is a finding.
Configure the VMM to enforce password complexity by requiring that at least one numeric character be used.
Verify the VMM requires the change of at least eight of the total number of characters when passwords are changed. If it does not, this is a finding.
Configure the VMM to require the change of at least eight of the total number of characters when passwords are changed.
Verify the VMM stores only encrypted representations of passwords. If it does not, this is a finding.
Configure the VMM to store only encrypted representations of passwords.
Verify the VMM transmits only encrypted representations of passwords. If it does not, this is a finding.
Configure the VMM to transmit only encrypted representations of passwords.
Verify the VMM enforces 24 hours/one day as the minimum password lifetime. If it does not, this is a finding.
Configure the VMM to enforce 24 hours/one day as the minimum password lifetime.
Verify the VMM enforces a 60-day maximum password lifetime restriction. If it does not, this is a finding.
Configure the VMM to enforce a 60-day maximum password lifetime restriction.
Verify the VMM enforces a minimum 15-character password length. If it does not, this is a finding.
Configure the VMM to enforce a minimum 15-character password length.
Verify the VMM obscures feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals. If it does not, this is a finding.
Configure the VMM to obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.
Verify the VMM enforces approved authorizations for logical access to information and system resources in accordance with applicable access control policies. If it does not, this is a finding.
Configure the VMM to enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
Verify the VMM is configured to disable non-essential capabilities. If it is not, this is a finding.
Configure the VMM to disable non-essential capabilities.
Verify the VMM is configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments. If it is not, this is a finding.
Configure the VMM to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
Verify the VMM uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users). If it does not, this is a finding.
Configure the VMM to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
Verify the VMM uses multifactor authentication for network access to privileged accounts. If it does not, this is a finding.
Configure the VMM to use multifactor authentication for network access to privileged accounts.
Verify the VMM uses multifactor authentication for network access to non-privileged accounts. If it does not, this is a finding.
Configure the VMM to use multifactor authentication for network access to non-privileged accounts.
Verify the VMM uses multifactor authentication for local access to privileged accounts. If it does not, this is a finding.
Configure the VMM to use multifactor authentication for local access to privileged accounts.
Verify the VMM uses multifactor authentication for local access to nonprivileged accounts. If it does not, this is a finding.
Configure the VMM to use multifactor authentication for local access to nonprivileged accounts.
Verify the VMM requires individuals to be authenticated with an individual authenticator prior to using a group authenticator. If it does not, this is a finding.
Configure the VMM to require individuals to be authenticated with an individual authenticator prior to using a group authenticator.
Verify the VMM implements replay-resistant authentication mechanisms for network access to privileged accounts. If it does not, this is a finding.
Configure the VMM to implement replay-resistant authentication mechanisms for network access to privileged accounts.
Verify the VMM implements replay-resistant authentication mechanisms for network access to nonprivileged accounts. If it does not, this is a finding.
Configure the VMM to implement replay-resistant authentication mechanisms for network access to nonprivileged accounts.
Verify the VMM uniquely identifies peripherals before establishing a connection. If it does not, this is a finding.
Configure the VMM to uniquely identify peripherals before establishing a connection.
Verify the VMM disables local account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity. If it does not, this is a finding.
Configure the VMM to disable local account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.
Verify the VMM uses mechanisms meeting the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module. If it does not, this is a finding.
Configure the VMM to use mechanisms meeting the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.
Verify the VMM supports an audit reduction capability that supports on-demand reporting requirements. If it does not, this is a finding.
Configure the VMM to support an audit reduction capability that supports on-demand reporting requirements.
Verify the VMM is configured such that emergency administrator accounts are automatically removed or disabled after the crisis is resolved or 72 hours. If it is not, this is a finding.
Configure the VMM such that emergency administrator accounts are automatically removed or disabled after the crisis is resolved or 72 hours.
Verify the VMM employs strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions. If it does not, this is a finding.
Configure the VMM to employ strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions.
Verify the VMM separates user functionality (including user interface services) from VMM management functionality. If it does not, this is a finding.
Configure the VMM to separate user functionality (including user interface services) from VMM management functionality.
Verify the VMM isolates security functions from non-security functions. If it does not, this is a finding.
Configure the VMM to isolate security functions from non-security functions.
Verify the VMM prevents unauthorized and unintended information transfer via shared system resources. If it does not, this is a finding.
Configure the VMM to prevent unauthorized and unintended information transfer via shared system resources.
Verify the VMM manages excess capacity, bandwidth, or other redundancy to limit the effects of information-flooding types of Denial of Service (DoS) attacks. If it does not, this is a finding.
Configure the VMM to manage excess capacity, bandwidth, or other redundancy to limit the effects of information-flooding types of Denial of Service (DoS) attacks.
Verify the VMM terminates all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity; and for user sessions (non-privileged session), the session must be terminated after 15 minutes of inactivity, except to fulfill documented and validated mission requirements. If it does not, this is a finding.
Configure the VMM to terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity; and for user sessions (non-privileged session), the session must be terminated after 15 minutes of inactivity, except to fulfill documented and validated mission requirements.
Verify the VMM fails to a secure state if system initialization fails, shutdown fails, or aborts fail. If it does not, this is a finding.
Configure the VMM to fail to a secure state if system initialization fails, shutdown fails, or aborts fail.
Verify the VMM protects the confidentiality and integrity of all information at rest. If it does not, this is a finding.
Configure the VMM to protect the confidentiality and integrity of all information at rest.
Verify the VMM checks the validity of all data inputs except those specifically identified by the organization. If it does not, this is a finding.
Configure the VMM to check the validity of all data inputs except those specifically identified by the organization.
Verify the VMM generates error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries. If it does not, this is a finding.
Configure the VMM to generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
Verify the VMM reveals system error messages only to authorized users. If it does not, this is a finding.
Configure the VMM to reveal system error messages only to authorized users.
Verify all interactions among guest VMs are mediated by the VMM or its service VMs to support proper function. If they are not, this is a finding.
Configure all interactions among guest VMs to be mediated by the VMM or its service VMs to support proper function.
Verify the VMM automatically audits account modification. If it does not, this is a finding.
Configure the VMM to automatically audit account modification.
Verify the VMM automatically audits account disabling actions. If it does not, this is a finding.
Configure the VMM to automatically audit account disabling actions.
Verify the VMM automatically audits account removal actions. If it does not, this is a finding.
Configure the VMM to automatically audit account removal actions.
Verify all guest VM network communications are implemented through use of virtual network devices provisioned by the VMM. If they are not, this is a finding.
Configure all guest VM network communications to be implemented through use of virtual network devices provisioned by the VMM.
Verify all interactions between guest VMs and external systems, via other interface devices, are mediated by the VMM or its service VMs. If they are not, this is a finding.
Configure all interactions between guest VMs and external systems, via other interface devices, are mediated by the VMM or its service VMs.
Verify the VMM implements cryptography to protect the integrity of remote access sessions. If it does not, this is a finding.
Configure the VMM to implement cryptography to protect the integrity of remote access sessions.
Verify the VMM initiates session audits at system startup. If it does not, this is a finding.
Configure the VMM to initiate session audits at system startup.
Verify the VMM produces audit records containing information to establish the identity of any individual or process associated with the event. If it does not, this is a finding.
Configure the VMM to produce audit records containing information to establish the identity of any individual or process associated with the event.
Verify the VMM protects audit tools from unauthorized access. If it does not, this is a finding.
Configure the VMM to protect audit tools from unauthorized access.
Verify the VMM protects audit tools from unauthorized modification. If it does not, this is a finding.
Configure the VMM to protect audit tools from unauthorized modification.
Verify the VMM protects audits tools from unauthorized deletion. If it does not, this is a finding.
Configure the VMM to protect audit tools from unauthorized deletion.
Verify the VMM limits privileges to change software resident within software libraries. If it does not, this is a finding.
Configure the VMM to limit privileges to change software resident within software libraries.
Verify the VMM enforces password complexity by requiring that at least one special character be used. If it does not, this is a finding.
Configure the VMM to enforce password complexity by requiring that at least one special character be used.
Verify the VMM preserves any information necessary, in the event of a system failure, to determine cause of failure and any information necessary to return to operations with least disruption to mission processes. If it does not, this is a finding.
Configure the VMM to preserve any information necessary, in the event of a system failure, to determine cause of failure and any information necessary to return to operations with least disruption to mission processes.
Verify the VMM notifies SAs and ISSOs when accounts are created. If it does not, this is a finding.
Configure the VMM to notify SAs and ISSOs when accounts are created.
Verify the VMM notifies the SA and ISSO when accounts are modified. If it does not, this is a finding.
Configure the VMM to notify the SA and ISSO when accounts are modified.
Verify the VMM notifies the SA and ISSO when accounts are disabled. If it does not, this is a finding.
Configure the VMM to notify the SA and ISSO when accounts are disabled.
Verify the VMM notifies the SA and ISSO when accounts are removed. If it does not, this is a finding.
Configure the VMM to notify the SA and ISSO when accounts are removed.
Verify the VMM uses cryptographic mechanisms to protect the integrity of audit tools. If it does not, this is a finding.
Configure the VMM to use cryptographic mechanisms to protect the integrity of audit tools.
Verify the VMM automatically terminates a user session after inactivity timeouts have expired or at shutdown. If it does not, this is a finding.
Configure the VMM to automatically terminate a user session after inactivity timeouts have expired or at shutdown.
Verify VMMs requiring user access authentication provide a logout capability for user-initiated communications sessions. If they do not, this is a finding.
Configure VMMs requiring user access authentication to provide a logout capability for user-initiated communications sessions.
Verify the VMM displays an explicit logout message to users indicating the reliable termination of authenticated communications sessions. If it does not, this is a finding.
Configure the VMM to display an explicit logout message to users indicating the reliable termination of authenticated communications sessions.
Verify the VMM controls remote access methods. If it does not, this is a finding.
Configure the VMM to control remote access methods.
Verify the VMM provides the capability to immediately disconnect or disable remote access to the information system. If it does not, this is a finding.
Configure the VMM to provide the capability to immediately disconnect or disable remote access to the information system.
Verify the VMM protects wireless access to the system using encryption. If it does not, this is a finding.
Configure the VMM to protect wireless access to the system using encryption.
Verify the VMM protects wireless access to the system using authentication of users and/or devices. If it does not, this is a finding.
Configure the VMM to protect wireless access to the system using authentication of users and/or devices.
Verify the VMM automatically audits account enabling actions. If it does not, this is a finding.
Configure the VMM to automatically audit account enabling actions.
Verify the VMM notifies the SA and ISSO of account enabling actions. If it does not, this is a finding.
Configure the VMM to notify the SA and ISSO of account enabling actions.
Verify the VMM implements discretionary access controls to allow VMM admins to pass information to any other VMM admin, user, or guest VM. If it does not, this is a finding.
Configure the VMM to implement discretionary access controls to allow VMM admins to pass information to any other VMM admin, user, or guest VM.
Verify the VMM implements discretionary access controls to allow VMM admins to grant their privileges to other VMM admins. If it does not, this is a finding.
Configure the VMM to implement discretionary access controls to allow VMM admins to grant their privileges to other VMM admins.
Verify the VMM implements discretionary access controls to allow VMM admins to change security attributes on users, guest VMs, the VMM, or the VMM's components. If it does not, this is a finding.
Configure the VMM to implement discretionary access controls to allow VMM admins to change security attributes on users, guest VMs, the VMM, or the VMM's components.
Verify the VMM implements discretionary access controls to allow VMM admins to choose the security attributes to be associated with newly created or revised guest VMs. If it does not, this is a finding.
Configure the VMM to implement discretionary access controls to allow VMM admins to choose the security attributes to be associated with newly created or revised guest VMs.
Verify the VMM prevents non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures. If it does not, this is a finding.
Configure the VMM to prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
Verify the VMM prevents all software from executing at higher privilege levels than users executing the software. If it does not, this is a finding.
Configure the VMM to prevent all software from executing at higher privilege levels than users executing the software.
Verify the VMM audits the execution of privileged functions. If it does not, this is a finding.
Configure the VMM to audit the execution of privileged functions.
Verify the VMM automatically locks an account until the locked account is released by an administrator, when three unsuccessful logon attempts in 15 minutes are made. If it does not, this is a finding.
Configure the VMM to automatically lock an account until the locked account is released by an administrator, when three unsuccessful logon attempts in 15 minutes are made.
Verify the VMM provides the capability for assigned IMOs/ISSOs or designated SAs to change the auditing to be performed on all VMM components, based on all selectable event criteria in near real time. If it does not, this is a finding.
Configure the VMM to provide the capability for assigned IMOs/ISSOs or designated SAs to change the auditing to be performed on all VMM components, based on all selectable event criteria in near real time.
Verify the VMM allocates audit record storage capacity to store at least one week's worth of audit records when audit records are not immediately sent to a central audit record storage facility. If it does not, this is a finding.
Configure the VMM to allocate audit record storage capacity to store at least one week's worth of audit records when audit records are not immediately sent to a central audit record storage facility.
Verify the VMM off-loads audit records onto a different system or media than the system being audited. If it does not, this is a finding.
Configure the VMM to off-load audit records onto a different system or media than the system being audited.
Verify the VMM provides an immediate warning to the SA and ISSO, at a minimum, when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity. If it does not, this is a finding.
Configure the VMM to provide an immediate warning to the SA and ISSO, at a minimum, when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity.
Verify the VMM provides an immediate real-time alert to the SA and ISSO, at a minimum, of all audit failure events requiring real-time alerts. If it does not, this is a finding.
Configure the VMM to provide an immediate real-time alert to the SA and ISSO, at a minimum, of all audit failure events requiring real-time alerts.
Verify the VMM provides an audit reduction capability that supports on-demand audit review and analysis. If it does not, this is a finding.
Configure the VMM to provide an audit reduction capability that supports on-demand audit review and analysis.
Verify the VMM provides an audit reduction capability that supports after-the-fact investigations of security incidents. If it does not, this is a finding.
Configure the VMM to provide an audit reduction capability that supports after-the-fact investigations of security incidents.
Verify the VMM provides a report generation capability that supports on-demand audit review and analysis. If it does not, this is a finding.
Ensure the VMM provides a report generation capability that supports on-demand audit review and analysis.
Verify the VMM provides a report generation capability that supports on-demand reporting requirements. If it does not, this is a finding.
Ensure the VMM provides a report generation capability that supports on-demand reporting requirements.
Verify the VMM provides a report generation capability that supports after-the-fact investigations of security incidents. If it does not, this is a finding.
Ensure the VMM provides a report generation capability that supports after-the-fact investigations of security incidents.
Verify the VMM that provides an audit reduction capability does not alter original content or time ordering of audit records. If it does not, this is a finding.
Configure the VMM that provides an audit reduction capability so that it does not alter original content or time ordering of audit records.
Verify the VMM that provides a report generation capability does not alter original content or time ordering of audit records. If it does not, this is a finding.
Configure the VMM that provides a report generation capability so that it does not alter original content or time ordering of audit records.
Verify the VMM, for networked systems, compares internal information system clocks at least every 24 hours with a server which is synchronized to one of the redundant USNO time servers or a time server designated for the appropriate DOD network (NIPRNet/SIPRNet), and/or the GPS. If it does not, this is a finding.
Configure the VMM, for networked systems, to compare internal information system clocks at least every 24 hours with a server which is synchronized to one of the redundant USNO time servers or a time server designated for the appropriate DOD network (NIPRNet/SIPRNet), and/or the GPS.
Verify the VMM synchronizes internal information system clocks to the authoritative time source when the time difference is greater than one second. If it does not, this is a finding.
Configure the VMM to synchronize internal information system clocks to the authoritative time source when the time difference is greater than one second.
Verify the VMM records time stamps for audit records that meet a granularity of one second for a minimum degree of precision. If it does not, this is a finding.
Configure the VMM to record time stamps for audit records that meet a granularity of one second for a minimum degree of precision.
Verify the VMM records time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT). If it does not, this is a finding.
Configure the VMM to record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
Verify the VMM enforces dual authorization for movement and/or deletion of all audit information, when such movement or deletion is not part of an authorized automatic process. If it does not, this is a finding.
Configure the VMM to enforce dual authorization for movement and/or deletion of all audit information, when such movement or deletion is not part of an authorized automatic process.
Verify the VMM prohibits user installation of software or guest VMs without explicit privileged status. If it does not, this is a finding.
Configure the VMM to prohibit user installation of software or guest VMs without explicit privileged status.
Verify the VMM notifies designated personnel if baseline configurations are changed in an unauthorized manner. If it does not, this is a finding.
Configure the VMM to notify designated personnel if baseline configurations are changed in an unauthorized manner.
Verify the VMM enforces access restrictions associated with changes to the system. If it does not, this is a finding.
Configure the VMM to enforce access restrictions associated with changes to the system.
Verify the VMM audits the enforcement actions used to restrict access associated with changes to the system. If it does not, this is a finding.
Configure the VMM to audit the enforcement actions used to restrict access associated with changes to the system.
Verify the VMM prevents the installation of guest VMs, patches, service packs, device drivers, or VMM components without verification they have been digitally signed using a certificate that is recognized and approved by the organization. If it does not, this is a finding.
Configure the VMM to prevent the installation of guest VMs, patches, service packs, device drivers, or VMM components without verification they have been digitally signed using a certificate that is recognized and approved by the organization.
Verify the VMM prevents use of service and helper VMs not required to support proper VMM function. If it does not, this is a finding.
Configure the VMM to prevent use of service and helper VMs not required to support proper VMM function.
Verify the VMM prevents inappropriate use of redundant guest VMs. If it does not, this is a finding.
Configure the VMM to prevent inappropriate use of redundant guest VMs.
Verify the VMM employs a deny-all, permit-by-exception policy to allow the execution of authorized software programs and guest VMs. If it does not, this is a finding.
Configure the VMM to employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs and guest VMs.
Verify the VMM implements multifactor authentication for remote access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access. If it does not, this is a finding.
Configure the VMM to implement multifactor authentication for remote access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access.
Verify the VMM accepts Personal Identity Verification (PIV) credentials. If it does not, this is a finding.
Configure the VMM to accept Personal Identity Verification (PIV) credentials.
Verify the VMM electronically verifies Personal Identity Verification (PIV) credentials. If it does not, this is a finding.
Configure the VMM to electronically verify Personal Identity Verification (PIV) credentials.
Verify the VMM authenticates peripherals before establishing a connection. If it does not, this is a finding.
Configure the VMM to authenticate peripherals before establishing a connection.
Verify the VMM authenticates all endpoint devices before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based. If it does not, this is a finding.
Configure the VMM to authenticate all endpoint devices before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based.
Verify the VMM prohibits the use of cached authenticators after one day. If it does not, this is a finding.
Configure the VMM to prohibit the use of cached authenticators after one day.
Verify the VMM, for PKI-based authentication, implements a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network. If it does not, this is a finding.
Configure the VMM, for PKI-based authentication, to implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.
Verify the VMM implements NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards. If it does not, this is a finding.
Configure the VMM to implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
Verify the VMM requests data origin authentication verification on the name/address resolution responses the system receives from authoritative sources. If it does not, this is a finding.
Configure the VMM to request data origin authentication verification on the name/address resolution responses the system receives from authoritative sources.
Verify the VMM requests data integrity verification on the name/address resolution responses the system receives from authoritative sources. If it does not, this is a finding.
Configure the VMM to request data integrity verification on the name/address resolution responses the system receives from authoritative sources.
Verify the VMM performs data integrity verification on the name/address resolution responses the system receives from authoritative sources. If it does not, this is a finding.
Configure the VMM to perform data integrity verification on the name/address resolution responses the system receives from authoritative sources.
Verify the VMM performs data origin verification authentication on the name/address resolution responses the system receives from authoritative sources. If it does not, this is a finding.
Configure the VMM to perform data origin verification authentication on the name/address resolution responses the system receives from authoritative sources.
Verify the VMM only allows the use of DoD PKI-established certificate authorities for verification of the establishment of protected sessions. If it does not, this is a finding.
Configure the VMM to only allow the use of DoD PKI-established certificate authorities for verification of the establishment of protected sessions.
Verify the VMM implements cryptographic mechanisms to prevent unauthorized modification of all information at rest on all VMM components. If it does not, this is a finding.
Configure the VMM to implement cryptographic mechanisms to prevent unauthorized modification of all information at rest on all VMM components.
Verify the VMM implements cryptographic mechanisms to prevent unauthorized disclosure of all information at rest on all VMM components. If it does not, this is a finding.
Configure the VMM to implement cryptographic mechanisms to prevent unauthorized disclosure of all information at rest on all VMM components.
Verify the VMM maintains a separate execution domain for each executing process. If it does not, this is a finding.
Configure the VMM to maintain a separate execution domain for each executing process.
Verify the VMM maintains a separate execution domain for each guest VM. If it does not, this is a finding.
Configure the VMM to maintain a separate execution domain for each guest VM.
Verify the VMM protects against or limit the effects of Denial of Service (DoS) attacks by ensuring the VMM is implementing rate-limiting measures on impacted network interfaces. If it does not, this is a finding.
Configure the VMM to protect against or limit the effects of Denial of Service (DoS) attacks by ensuring the VMM is implementing rate-limiting measures on impacted network interfaces.
Verify the VMM protects the confidentiality and integrity of transmitted information. If it does not, this is a finding.
Configure the VMM to protect the confidentiality and integrity of transmitted information.
Verify the VMM maintains the confidentiality and integrity of information during preparation for transmission. If it does not, this is a finding.
Configure the VMM to maintain the confidentiality and integrity of information during preparation for transmission.
Verify the VMM maintains the confidentiality and integrity of information during reception. If it does not, this is a finding.
Configure the VMM to maintain the confidentiality and integrity of information during reception.
Verify the VMM behaves in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received. If it does not, this is a finding.
Ensure the VMM behaves in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.
Verify the VMM implements non-executable data to protect its memory from unauthorized code execution. If it does not, this is a finding.
Configure the VMM to implement non-executable data to protect its memory from unauthorized code execution.
Verify the VMM implements address space layout randomization to protect its memory from unauthorized code execution. If it does not, this is a finding.
Configure the VMM to implement address space layout randomization to protect its memory from unauthorized code execution.
Verify the VMM removes all software components after updated versions have been installed. If it does not, this is a finding.
Configure the VMM to remove all software components after updated versions have been installed.
Verify the VMM verifies correct operation of all security functions. If it does not, this is a finding.
Configure the VMM to verify correct operation of all security functions.
Verify the VMM performs verification of the correct operation of security functions: upon system startup and/or restart; upon command by a user with privileged access; and/or every 30 days. If it does not, this is a finding.
Configure the VMM to perform verification of the correct operation of security functions: upon system startup and/or restart; upon command by a user with privileged access; and/or every 30 days.
Verify the VMM shuts down, restarts, and/or notifies the system administrator when anomalies in the operation of any security functions are discovered. If it does not, this is a finding.
Configure the VMM to shut down, restart, and/or notify the system administrator when anomalies in the operation of any security functions are discovered.
Verify the VMM generates audit records when successful/unsuccessful attempts to access security objects occur. If it does not, this is a finding.
Configure the VMM to generate audit records when successful/unsuccessful attempts to access security objects occur.
Verify the VMM generates audit records when successful/unsuccessful attempts to access security levels occur. If it does not, this is a finding.
Configure the VMM to generate audit records when successful/unsuccessful attempts to access security levels occur.
Verify the VMM generates audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur. If it does not, this is a finding.
Configure the VMM to generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur.
Verify the VMM generates audit records when successful/unsuccessful attempts to modify privileges occur. If it does not, this is a finding.
Configure the VMM to generate audit records when successful/unsuccessful attempts to modify privileges occur.
Verify the VMM generates audit records when successful/unsuccessful attempts to modify security objects occur. If it does not, this is a finding.
Configure the VMM to generate audit records when successful/unsuccessful attempts to modify security objects occur.
Verify the VMM generates audit records when successful/unsuccessful attempts to modify security levels occur. If it does not, this is a finding.
Configure the VMM to generate audit records when successful/unsuccessful attempts to modify security levels occur.
Verify the VMM generates audit records when successful/unsuccessful attempts to delete privileges occur. If it does not, this is a finding.
Configure the VMM to generate audit records when successful/unsuccessful attempts to delete privileges occur.
Verify the VMM generates audit records when successful/unsuccessful attempts to delete security levels occur. If it does not, this is a finding.
Configure the VMM to generate audit records when successful/unsuccessful attempts to delete security levels occur.
Verify the VMM generates audit records when successful/unsuccessful attempts to delete security objects occur. If it does not, this is a finding.
Configure the VMM to generate audit records when successful/unsuccessful attempts to delete security objects occur.
Verify the VMM generates audit records when successful/unsuccessful logon attempts occur. If it does not, this is a finding.
Configure the VMM to generate audit records when successful/unsuccessful logon attempts occur.
Verify the VMM generates audit records for privileged activities or other system-level access. If it does not, this is a finding.
Configure the VMM to generate audit records for privileged activities or other system-level access.
Verify the VMM generates audit records showing starting and ending time for user access to the system. If it does not, this is a finding.
Configure the VMM to generate audit records showing starting and ending time for user access to the system.
Verify the VMM generates audit records when concurrent logons from different workstations occur. If it does not, this is a finding.
Configure the VMM to generate audit records when concurrent logons from different workstations occur.
Verify the VMM generates audit records when successful/unsuccessful accesses to objects occur. If it does not, this is a finding.
Configure the VMM to generate audit records when successful/unsuccessful accesses to objects occur.
Verify the VMM generates audit records for all direct access to the VMM. If it does not, this is a finding.
Configure the VMM to generate audit records for all direct access to the VMM.
Verify the VMM generates audit records for all account creations, modifications, disabling, and termination events. If it does not, this is a finding.
Configure the VMM to generate audit records for all account creations, modifications, disabling, and termination events.
Verify the VMM generates audit records for all module load, unload, and restart actions, and also for all program and guest VM initiations. If it does not, this is a finding.
Configure the VMM to generate audit records for all module load, unload, and restart actions, and also for all program and guest VM initiations.
Verify the VMM implements NIST FIPS-validated cryptography for the following: to provision digital signatures; to generate cryptographic hashes; and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards. If it does not, this is a finding.
Configure the VMM to implement NIST FIPS-validated cryptography for the following: to provision digital signatures; to generate cryptographic hashes; and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
Verify the VMM, at a minimum, off-loads interconnected systems in real time and off-loads standalone systems weekly. If it does not, this is a finding.
Configure the VMM to, at a minimum, off-load interconnected systems in real time and off-load standalone systems weekly.
Verify the VMM is configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs. If it does not, this is a finding.
Configure the VMM to be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
Verify the VMM protects the confidentiality and integrity of communications with wireless peripherals. If it does not, this is a finding.
Configure the VMM to protect the confidentiality and integrity of communications with wireless peripherals.
Verify the VMM is configured to disable accounts when the accounts are no longer associated to a user. If the VMM is not configured to disable accounts when the accounts are no longer associated to a user, this is a finding.
Configure the VMM to disable accounts when the accounts are no longer associated to a user.
Verify the VMM is configured to prohibit the use or connection of unauthorized hardware components. If the VMM is not configured to prohibit the use or connection of unauthorized hardware components, this is a finding.
Configure the VMM to prohibit the use or connection of unauthorized hardware components.
Verify the VMM is configured to implement multifactor authentication for local, network, and/or remote access to privileged accounts and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements. If the VMM is not configured to implement multifactor authentication for local, network, and/or remote access to privileged accounts and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements, this is a finding.
Configure the VMM to implement multifactor authentication for local, network, and/or remote access to privileged accounts and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements.
Verify the VMM is configured to verify when users create or update passwords the passwords are not found on the list of commonly-used, expected, or compromised passwords in ia-5 (1) (a). If the VMM is not configured to verify when users create or update passwords the passwords are not found on the list of commonly-used, expected, or compromised passwords in ia-5 (1) (a), this is a finding.
Configure the VMM to verify when users create or update passwords the passwords are not found on the list of commonly-used, expected, or compromised passwords in ia-5 (1) (a).
Verify the VMM is configured to require immediate selection of a new password upon account recovery. If the VMM is not configured to require immediate selection of a new password upon account recovery, this is a finding.
Configure the VMM to require immediate selection of a new password upon account recovery.
Verify the VMM is configured to allow user selection of long passwords and passphrases, including spaces and all printable characters. If the VMM is not configured to allow user selection of long passwords and passphrases, including spaces and all printable characters, this is a finding.
Configure the VMM to allow user selection of long passwords and passphrases, including spaces and all printable characters.
Verify the VMM is configured to employ automated tools to assist the user in selecting strong password authenticators. If the VMM is not configured to employ automated tools to assist the user in selecting strong password authenticators, this is a finding.
Configure the VMM to employ automated tools to assist the user in selecting strong password authenticators.
Verify the VMM is configured to accept only external credentials that are NIST-compliant. If the VMM is not configured to accept only external credentials that are NIST-compliant, this is a finding.
Configure the VMM to accept only external credentials that are NIST-compliant.
Verify the VMM is configured to monitor the use of maintenance tools that execute with increased privilege. If the VMM is not configured to monitor the use of maintenance tools that execute with increased privilege, this is a finding.
Configure the VMM to monitor the use of maintenance tools that execute with increased privilege.
Verify the VMM is configured to include only approved trust anchors in trust stores or certificate stores managed by the organization. If the VMM is not configured to include only approved trust anchors in trust stores or certificate stores managed by the organization, this is a finding.
Configure the VMM to include only approved trust anchors in trust stores or certificate stores managed by the organization.
Verify the VMM is configured to provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store. If the VMM is not configured to provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store, this is a finding.
Configure the VMM to provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store.
Verify the VMM is configured to synchronize system clocks within and between systems or system components. If the VMM is not configured to synchronize system clocks within and between systems or system components, this is a finding.
Configure the VMM to synchronize system clocks within and between systems or system components.
Verify the VMM is configured to employ automated patch management tools to facilitate flaw remediation to the organization-defined system components. If the VMM is not configured to employ automated patch management tools to facilitate flaw remediation to the organization-defined system components, this is a finding.
Configure the VMM to employ automated patch management tools to facilitate flaw remediation to the organization-defined system components.