The VMware Aria Operations CSA Compliance Pack for VMware Cloud Foundation displays the following alerts.

Alerts in the CSA Compliance Pack

vCenter Alerts
Alert Definition Symptom Name
vCenter Server is violating VMware Cloud Foundation Compliance based on Cloud Security Alliance Guidelines.(v4.2 and above)

vCenter.set-time-keeping - Configure vCenter Server timekeeping

SSH Access is not restricted

vCenter.set-firewall - Firewall is not configured

The number of Network interface controllers is violating the recommended value

vCenter.set-remote-logging - Remote logging is not enabled

vCenter.set-file-based-backup-recovery - File-Based Backup and Recovery is not Configured

Host System Alerts
Alert Definition Symptom Name
ESXi Host is violating VMware Cloud Foundation Compliance based on Cloud Security Alliance Guidelines.(v4.2 and above)

Non-compliant ESXi Shell service startup policy

ESXi Shell service is running

ESXi.set-account-lockout - The count of failed login attempts before which the account gets locked out is not set to recommended value as per CSA Compliance Guidelines

ESXi.verify-acceptance-level-supported - Image Profile and VIB Acceptance Levels are none of VMware Certified, VMware Accepted or Partner Supported

ESXi.disable-mob - Managed Object Browser (MOB) is activated

ESXi.enable-remote-syslog - Remote logging is not configured for ESXi hosts

ESXi.enable-ad-auth - Local user authentication is not configured with LDAP

ESXi.ad-auth-proxy-domain-membership-status - The Domain membership status is not set

The welcome message is not set

The SSH connection banner is not set

The exception users list is violating the recommended value

ESXi.config-persistent-logs - Persistent logging is not configured for all ESXi host

ESXi.config-ntp - NTP Server property is not configured

ESXi.config-ntp - NTP Daemon policy is not enabled

ESXi.config-ntp - NTP Daemon service is not running

ESXi.set-dcui-access - DCUI.Access is not to recommended value as per CSA Compliance Guidelines

ESXi.enable-chap-auth - Bidirectional CHAP is not enabled, authentication for iSCSI traffic

ESXi.set-disable-deprecated-ssl-tls - Deactivate deprecated SSL or TLS protocols

ESXi.set-hyperthread-security-warning - Warning for potential hyperthreading security vulnerability is suppressed

ESXi.set-slp-svc-stop - The SLP service is running

ESXi.set-slp-policy-off - The SLP service policy is On

ESXi.set-shell-warning-enabled - Warning for support and troubleshooting interfaces is suppressed

The lockdown mode is not set to recommended value as per CSA Compliance Guidelines

ESXi.set-shell-interactive-timeout - Timeout configured for idle ESXi Shell and SSH sessions is not set to recommended value as per CSA Compliance Guidelines

vNetwork.enable-bpdu-filter - BPDU filter on the ESXi host to prevent being locked out of physical switch ports with Portfast and BPDU Guard is not enabled

ESXi.set-security-password-history - The Password reuse history configured for ESXi Shell and SSH sessions is not set to recommended value as per CSA Compliance Guidelines

ESXi.TransparentPageSharing-intra-enabled - The default setting for intra-VM TPS is not correct

ESXi.set-account-auto-unlock-time - The time after which a locked account is automatically unlocked is not set to recommended value as per CSA Compliance Guidelines

ESXi.set-dcui-timeout - The idle connections to DCUI to terminate left over login session is not set to recommended value as per CSA Compliance Guidelines

vNetwork.verify-dvfilter-bind - Users and processes without privileges can make use of dvfilter network APIs

ESXi.set-info-logging-level - The log level is not set to info

ESXi.set-password-policies - Password policy is not set to recommended value as per CSA Compliance Guidelines

The SNMP Server startup policy is violating the recommended value

ESXi.config-snmp - SNMP service is running

The ESXi host client sessions timeout is not set to recommended value as per CSA Compliance Guidelines

The maximum number of days between password changes is not set to recommended value as per CSA Compliance Guidelines

ESXi.set-cimsfcb-watchdog-policy-off - The SFCBD Watch dog service policy is On

ESXi.set-cimsfcb-watchdog-svc-stop - The SFCBD Watch dog service is running

ESXi.set-ssh-policy-off - The SSH service policy is On

ESXi.set-ssh-svc-stop - The SSH service is running

Virtual Machine Alerts
Alert Definition Symptom Name
Virtual Machine is violating VMware Cloud Foundation Compliance based on Cloud Security Alliance Guidelines.(v4.2 and above)

VM.disable-console-copy - Copy/paste operations are activated

VM.disable-console-drag-n-drop - Copy/paste operations are activated

VM.disable-console-paste - Copy/paste operations are activated

VM.disable-disk-shrinking-shrink - Virtual disk shrinking is activated

VM.disable-disk-shrinking-wiper - Virtual disk shrinking is activated

VM.disable-independent-nonpersistent - Independent nonpersistent disks are being used

VM.disconnect-devices-floppy - Floppy drive connected

CD-ROM connected

VM.disconnect-devices-parallel - Parallel port connected

VM.disconnect-devices-serial - Serial port connected

USB controller connected

Non-compliant max number of remote console connections

VM.limit-setinfo-size - Informational messages from the VM to the VMX file is not set to recommended value as per CSA Compliance Guidelines

VM.prevent-device-interaction-connect - Users and processes without privileges can remove, connect and modify devices

VM.restrict-host-info - Guests can recieve host information

VM.verify-network-filter - Access to VMs are not controlled through dvfilter network APIs

VM.set-guest-session-locked - The console session is not locked

VM.disable-non-essential-3D-features Configure system security parameters - Deactivate 3D features on Server and desktop virtual machines

VM.set-vmotion-encrypted - The configured vMotion encryption is not set to recommended value as per CSA Compliance Guidelines

VM logging is not deactivated

VM.set-logs-size - The configured log size is not set to recommended value as per CSA Compliance Guidelines

VM.set-retained-logs-count - The number of retained VM diagnostic logs is not set to recommended value as per CSA Compliance Guidelines

VM.verify-PCI-Passthrough - PCI pass through device is configured on the virtual machine

Distributed Switch Alerts
Alert Definition Symptom Name
Distributed Switch is violating VMware Cloud Foundation Compliance based on Cloud Security Alliance Guidelines.(v4.2 and above)

vNetwork.limit-network-healthcheck - VDS network healthcheck for VLAN and MTU Health Check is enabled

Distributed Port Group Alerts
Alert Definition Symptom Name
Distributed Port Group is violating VMware Cloud Foundation Compliance based on Cloud Security Alliance Guidelines.(v4.2 and above)

vNetwork.reject-forged-transmit-dvportgroup - The Forged Transmits policy is not set to reject

vNetwork.reject-mac-changes-dvportgroup - The MAC Address Changes policy is not set to reject

Distributed Port Group is not an uplink

vNetwork.reject-promiscuous-mode-dvportgroup - The Promiscuous Mode policy is not set to reject

NSX Alerts
Alert Definition Symptom Name
NSX Instance is violating VMware Cloud Foundation Compliance based on Cloud Security Alliance Guidelines.(v4.2 and above)

NSX Manager Hardening is disabled

NSX Manager hasn't enforced a minimum 15-character password length as per CSA Compliance Guidelines

VMWare Identity Manager integration is not enabled in NSX Manager

SNMP v2c Traps are configured.

NSX Manager's Auth Policy 'API Lockout Period' is not set to recommended value.

NSX Manager's Auth Policy 'CLI Maximum Auth Failures' is not set to recommended value.

NSX Manager's Auth Policy 'CLI Lockout Period' is not set to recommended value.

NSX Manager's Auth Policy 'API Maximum Auth Failures' is not set to recommended value.

NSX Manager is not configured to conduct backups on an organizational defined schedule.

SNMP v2c Polling are configured.

System clock is not configured with the UTC timezone.

TLS v1.1 is enabled.

NSX manager communication to LDAP server for authentication is not using LDAPS.

NSX Manager's Auth Policy 'API Reset Period' is not set to recommended value.

The audit, guestuser1, or guestuser2 local accounts are active.

SFTP server not configured for backup.

NTP Service is not configured properly

Logging-servers are not configured with log level as 'INFO'.

Logging-servers are not configured with protocol of 'tcp' or 'li-tls' or 'tls'.

Management Service 'http' have session_timeout set to non-recommended value.

Management Service 'http' have 'Client API Rate Limit' not set to recommended value.

Management Service 'http' have 'Client API Concurrency Limit' not set to recommended value.

Management Service 'http' have 'Global API Concurrency Limit' not set to recommended value.

SSH Service is activated

Logical Switch Alerts
Alert Definition Symptom Name
Logical Switch is violating VMware Cloud Foundation Compliance based on Cloud Security Alliance Guidelines.(v4.2 and above)

NSX Logical Segment is not configured with a Spoof Guard Profile that has Port Binding enabled.

NSX Management Cluster Alerts
Alert Definition Symptom Name
NSX Management Cluster is violating VMware Cloud Foundation Compliance based on Cloud Security Alliance Guidelines.(v4.2 and above)

Management cluster management status unstable

Virtual IP (VIP) is not configured for NSX Management Cluster.

Management node count is less than 3.

SDDC Manager Alerts
Alert Definition Symptom Name
SDDC Manager is violating VMware Cloud Foundation Compliance based on Cloud Security Alliance Guidelines.(v4.2 and above)

File based backups are used and an external SFTP server is not configured

SDDC Manager must be configured with NTP servers

SSL certificate should be issued by a trusted certificate authority on the SDDC Manager

SDDC Manager must schedule automatic password rotation

SDDC Manager must be deployed with FIPs mode enabled

vSAN Alerts
Alert Definition Symptom Name
vSAN Instance is violating VMware Cloud Foundation Compliance based on Cloud Security Alliance Guidelines.(v4.2 and above)

Internet Access is not enabled for vSAN Clusters

Proxy server is not configured for Internet Connectivity for vSAN Clusters