1. Home
  2. Security Hardening
  3. DISA STIG VMware vSphere 6.7 VCenter V1R1
  4. VCTR-67-000065 – The vCenter Server must have Mutual CHAP configured for vSAN iSCSI targets.

VCTR-67-000065 – The vCenter Server must have Mutual CHAP configured for vSAN iSCSI targets.

Details

When Mutual CHAP is enabled, vSphere performs bidirectional authentication of both the iSCSI target and host. There is a potential for a MitM attack when not authenticating both the iSCSI target and host in which an attacker might impersonate either side of the connection to steal data. Bidirectional authentication mitigates this risk.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

From the vSphere Client, go to Hosts and Clusters >> select a vSAN Enabled Cluster >> Configure >> vSAN >> iSCSI Target Service.

For each iSCSI target, select the item and click ‘Edit’.

Change the ‘Authentication’ field to ‘Mutual CHAP’ and configure the incoming and outgoing users and secrets appropriately.

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Configuration Management.This control applies to the following type of system VMware.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles