Security Best Practices for Securing vCenter Server

You must follow multiple best practices at all times when you operate your vCenter Server instances.
Security Best Practices for Securing vCenter Server
Best Practice
Description
Assign correct roles to vCenter Server users.
VMW-VC-00415
Users and service accounts must be assigned only privileges they require. To reduce risk of confidentiality, availability, or integrity loss, the least privilege principle requires that these privileges must be assigned only if needed.
Use unique service accounts for applications that connect to vCenter Server.
VMW-VC-00401
Create a service account for each application that connects to vCenter Server. Grant only the required permissions for the application to run.
vCenter Server must restrict access to cryptographic permissions.
VMW-VC-01211
These permissions must be reserved for cryptographic administrators where VM and/or vSAN encryption is in use. Catastrophic data loss can result from a poorly administered cryptography. Only the Administrator and any site-specific cryptographic group must have the following permissions:
  • Cryptographic Operations privileges
  • Global.Diagnostics
  • Host.Inventory.Add host to cluster
  • Host.Inventory.Add standalone host
  • Host.Local operations.Manage user groups
Use templates to deploy virtual machines.
VMW-VC-01235
To create application-specific templates, use templates that contain a hardened, patched, and properly configured operating system . You can also use the application template to deploy virtual machines.
The vCenter Server must use LDAPS when adding an SSO identity source.
VMW-VC-01229
To protect the integrity of LDAP communications, secure LDAP (LDAPS) must be explicitly configured when adding an LDAP identity source in vSphere SSO. When configuring an identity source and supplying an SSL certificate, vCenter Server enforces secure LDAP.
The vCenter Server must implement Active Directory authentication
VMW-VC-01228
The vCenter Server must ensure users are authenticated with an individual authenticator prior to using a group authenticator. Using Active Directory for authentication provides more robust account management capabilities.
The vCenter Server must use a limited privilege account when adding an LDAP identity source
VMW-VC-01230
When adding an LDAP identity source to vSphere SSO, the account used to bind to the AD must be minimally privileged. This account only requires read rights to the base DN specified. Any other permissions inside or outside of that OU are unnecessary and violate least privilege.
Backup the vCenter Native Key Providers with a strong password.
VMW-VC-01239
The vCenter Native Key Provider acts as a key provider for encryption based capabilities, such as encrypted virtual machines, without requiring an external KMS solution. When activating this feature, a backup PCKS#12 file is created. If no password is provided during the backup process, the backup file can be used maliciously and compromise the environment.
Restrict access to the cryptographic role.
VMW-VC-01210
The built-in
Administrator
role has the permission to perform cryptographic operations, such as Key Management Server (KMS) functions and encrypting and decrypting virtual machine disks. This role must be reserved for cryptographic administrators, where virtual machine or vSAN encryption is required. All other vSphere administrators, who do not require cryptographic operations, must be assigned the
No cryptography administrator
role.
The vCenter Server Machine SSL certificate must be issued by an appropriate certificate authority.
VMW-VC-01205
The default self-signed, VMCA-issued vCenter reverse proxy certificate must be replaced with an approved certificate. The use of an approved certificate on the vCenter reverse proxy and other services assures clients that the service they are connecting to is legitimate and trusted.
Ensure that participation in CDP or LLDP is intentional.
VMW-VC-01247
The vSphere VDS can participate in Cisco Discovery Protocol (CDP) or Link Layer Discovery Protocol (LLDP), as a listener, advertiser, or both. This can facilitate improved mapping network topology and troubleshooting, however you must ensure that information sent and received is intentional, as this information can be used by an adversary to gain a better understanding of your environment.
Ensure that port mirroring is used legitimately.
VMW-VC-01248
The vSphere VDS can mirror traffic from one port to another, allowing observation of traffic. Ensure that port mirroring is used legitimately.
Configure the vCenter Server firewall for additional defense-in-depth.
VMW-VC-01251
vCenter Server has its own firewall settings that can be used in conjunction with a network/perimeter firewall for additional defense. Ensure that you configure it with
accept
rules for your workstations prior to configuring
deny
rules.
Remove unnecessary NICs.
VMW-VC-01252
In Center Server, you can configure multiple network interfaces connected to different networks. If a system has interfaces on different networks, there is potential to bridge the networks, or create a backdoor that circumvents network-based access controls. Ensure that all NICs are configured properly and are necessary.
Install security patches and updates for vCenter Server.
VMW-VC-01253
You install all security patches and updates on vCenter Server instances as soon as possible. An attacker can exploit known vulnerabilities when attempting to attain access or elevate privileges. Mitigate the risk of breaches by updating vCenter Server instances first and then updating ESXi hosts.
Configure Key Encryption Keys (KEKs) to be re-issued at regular intervals for the vSAN encrypted datastores.
VMW-VC-01213
Interview the SA to determine whether a procedure exists to perform a shallow re-key of all vSAN encrypted datastores at regular, site-defined intervals. This interval must be defined by the SA and the ISSO. If vSAN encryption is not in use, this is not applicable.
At a minimum, vCenter must provide an immediate, real-time alert to the system administrator (SA) and information system security officer (ISSO) of all audit failure events requiring real-time alerts.
VMW-VC-01254
Ensure that the Central Logging Server is configured to alert the SA and ISSO, at a minimum, on any AO-defined events. Otherwise, this is a finding. If there are no AO-defined events, this is not a finding.
Remove unnecessary virtual hardware devices from the VM.
VMW-VC-01257
Ensure that no device is connected to a virtual machine if it is not required. For example, serial and parallel ports are rarely used for virtual machines in a datacenter environment, and CD/DVD drives are usually connected only temporarily during software installation. USB devices, sound cards, and other unnecessary hardware may be introduced with migrations from VMware Workstation, Fusion, or through other tools. Any enabled or connected device represents a potential attack channel, through the possibility of device drivers that contain vulnerabilities, by granting the ability to introduce software or exfiltrate data to or from a protected environment.
Note: Removing the CD-ROM device may impact VMware Tools installation and maintenance.
Consider the risks of using Active Directory groups to authorize vSphere Administrators.
VMW-VC-01261
If you are using a centralized directory service such as Active Directory for both authentication and authorization, an attacker can can compromise the service and obtain authorization to other infrastructure services. It also means that the administrators ("Domain Admins") for the directory service are defacto administrators of infrastructure.
To help manage risk, where feasible, consider the use of local SSO groups for authorization.