{"id":29,"date":"2018-10-15T17:17:51","date_gmt":"2018-10-15T22:17:51","guid":{"rendered":"https:\/\/gr8n8tr0n.wordpress.com\/?p=29"},"modified":"2018-10-15T17:17:51","modified_gmt":"2018-10-15T22:17:51","slug":"the-vsphere-hardening-guide-where-do-i-start","status":"publish","type":"post","link":"http:\/\/blog.virtualnate.net\/wordpress\/2018\/10\/15\/the-vsphere-hardening-guide-where-do-i-start\/","title":{"rendered":"The vSphere Security Configuration Guide &#8211; Where do I start?"},"content":{"rendered":"<ol>\n<li>Ask yourself the question, what&#8217;s my compliance policy for the company, HIPPA, PCI, SOX, DISA, STIG, etc&#8230;<\/li>\n<li>Have I spoken to my internal audit staff?<\/li>\n<li>Have I spoken to my security team yet?<\/li>\n<\/ol>\n<div>The vSphere Security Configuration Guide remember is not the &#8220;VMware vSphere Security Configuration Law&#8221;, it&#8217;s a guide for you to use to best design a security policy around your virtual infrastructure.<\/div>\n<h1>Step 1 &#8211; Collaborate with Security<\/h1>\n<div>\n<p>I almost want to write a book on &#8216;How to be successful at Virtual Security&#8217; and step one of that book would include collaborating with your security department to craft a security policy document that describes the methods that will be used to secure the virtual infrastructure. \u00a0Let&#8217;s face it, securing your VMware Infrastructure isn&#8217;t easy.<\/p>\n<div id=\"attachment_731\" style=\"width: 194px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-731\" class=\"size-medium alignright wp-image-731\" src=\"http:\/\/192.168.0.2\/wordpress\/wp-content\/uploads\/2016\/11\/inception_vms_in_vms.jpg?w=368\" alt=\"inception_vms_in_vms\" width=\"184\" height=\"300\" srcset=\"http:\/\/blog.virtualnate.net\/wordpress\/wp-content\/uploads\/2016\/11\/inception_vms_in_vms.jpg 410w, http:\/\/blog.virtualnate.net\/wordpress\/wp-content\/uploads\/2016\/11\/inception_vms_in_vms-184x300.jpg 184w\" sizes=\"auto, (max-width: 184px) 100vw, 184px\" \/><p id=\"caption-attachment-731\" class=\"wp-caption-text\">this isn&#8217;t easy folks<\/p><\/div>\n<p>Partnering with your security team upfront vs. designing this yourself and waiting for their blessing after the fact will yield completely different results. \u00a0I think you&#8217;ll find that the collaborative method will not only surprise them but go along way in the secure design and crafting of a good security policy document, which ultimately can be used for both internal and external audit representatives as a roadmap for showing your work.<\/p>\n<\/div>\n<p><!--more--><\/p>\n<h1>Step 2 &#8211; Define Your Configuration Policy<\/h1>\n<div>Once you&#8217;ve bridged the gap with your security and audit teams, it&#8217;s time to look at defining the \u00a0configuration changes to your vSphere infrastructure that will meet your security standards which will ultimately complete\u00a0your joint security policy document. \u00a0If you&#8217;ve taken a close look at the <a href=\"https:\/\/www.vmware.com\/security\/hardening-guides.html\" target=\"_blank\" rel=\"noopener\">vSphere <\/a><a href=\"https:\/\/www.vmware.com\/security\/hardening-guides.html\">Security Configuration <\/a><a href=\"https:\/\/www.vmware.com\/security\/hardening-guides.html\" target=\"_blank\" rel=\"noopener\">Guides<\/a>, they can be quite overwhelming. \u00a0I&#8217;d suggest you take the time to read and understand what each configuration setting is, how it relates to your security environment, and how it impacts operational procedures for support. \u00a0Also, remember that anything chosen not to be configured based on your environment, you&#8217;ll need to ensure you have compensating controls in place to address any audit and compliance challenges.<\/div>\n<div>My suggestion is to keep it simple and start with the best practices options first. \u00a0If you&#8217;ve read the guides, you&#8217;ll notice they are broken down into different risk profiles of a 1, 2 or 3, 1 being more for environments like the FBI or CIA vs 3 being more based off VMware best practice recommendation that everyone should probably implement. \u00a0<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-738 size-full\" src=\"http:\/\/192.168.0.2\/wordpress\/wp-content\/uploads\/2016\/11\/screen-shot-2016-11-17-at-4-22-34-pm.png\" alt=\"screen-shot-2016-11-17-at-4-22-34-pm\" width=\"2542\" height=\"194\" srcset=\"http:\/\/blog.virtualnate.net\/wordpress\/wp-content\/uploads\/2016\/11\/screen-shot-2016-11-17-at-4-22-34-pm.png 2542w, http:\/\/blog.virtualnate.net\/wordpress\/wp-content\/uploads\/2016\/11\/screen-shot-2016-11-17-at-4-22-34-pm-300x23.png 300w, http:\/\/blog.virtualnate.net\/wordpress\/wp-content\/uploads\/2016\/11\/screen-shot-2016-11-17-at-4-22-34-pm-1024x78.png 1024w, http:\/\/blog.virtualnate.net\/wordpress\/wp-content\/uploads\/2016\/11\/screen-shot-2016-11-17-at-4-22-34-pm-768x59.png 768w, http:\/\/blog.virtualnate.net\/wordpress\/wp-content\/uploads\/2016\/11\/screen-shot-2016-11-17-at-4-22-34-pm-1536x117.png 1536w, http:\/\/blog.virtualnate.net\/wordpress\/wp-content\/uploads\/2016\/11\/screen-shot-2016-11-17-at-4-22-34-pm-2048x156.png 2048w, http:\/\/blog.virtualnate.net\/wordpress\/wp-content\/uploads\/2016\/11\/screen-shot-2016-11-17-at-4-22-34-pm-800x61.png 800w\" sizes=\"auto, (max-width: 2542px) 100vw, 2542px\" \/>I would start by reviewing all Risk Profile 3 options and determining how many if not all should be configured for you environment. \u00a0Then move onto RP2 and eventually RP1 options depending on your acceptable risk for your environment. \u00a0Examples could be something like the following:<\/div>\n<p style=\"padding-left:30px;\">All vSphere environments containing PCI data or DMZ workloads will have RP2 settings implemented, all other environments will have RP1 settings applied<\/p>\n<div>I won&#8217;t go into an explanation for the additional fields other than to remind you to read and understand then to help determine the RPs to implement. \u00a0Once you&#8217;ve identified the settings to be implemented, document accordingly and add to your joint security policy document.<\/div>\n<h1>Step 3 &#8211; Choose Your Tools<\/h1>\n<div>Now that you&#8217;ve identified the necessary configuration changes to implement, you&#8217;ll notice that the Security Configuration guides have various methods of making the configuration changes ranging form PowerCLI to vCLI to ESXi shell commands. \u00a0I&#8217;m partial to PowerCLI so let&#8217;s start with the tools used for making the configuration changes needed.<\/div>\n<h2>PowerGUI<\/h2>\n<p>This tool isn&#8217;t really being supported anymore, but for those that like a GUI like interface, this little gem can help you build out PowerCLI scripts from the samples in the vSphere Hardening Guide and apply to your environment.\u00a0 There&#8217;s not a lot of great tools out there other than scripting things yourself, so I&#8217;d make sure you&#8217;re comfortable with writing your own PowerCLI or VMware CLI scripts to apply to your environment and make sure you test them out ahead of time.\u00a0 You can still download PowerGUI <a href=\"https:\/\/www.softpedia.com\/get\/Programming\/File-Editors\/Quest-PowerGUI.shtml\" target=\"_blank\" rel=\"noopener\">here<\/a>.\u00a0 If you prefer not to use a GUI for running scripts, that&#8217;s fine as long as you understand how to build out a robust Powershell server to run scripts in your environment and I&#8217;d recommend not using your own laptop.\u00a0 You&#8217;ll also need to make sure you have the right VMware PowerCLI package installed based on the version of vSphere you&#8217;re running in your environment.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1479 aligncenter size-large\" src=\"http:\/\/192.168.0.2\/wordpress\/wp-content\/uploads\/2018\/10\/quest-powergui_23.png?w=2048\" alt=\"Quest-PowerGUI_23\" width=\"1024\" height=\"728\" \/><\/p>\n<h2>vRealize Configuration Manager<\/h2>\n<div>The product has been around for awhile and provides a good platform for setting configuration baselines on your virtual environment.\u00a0 As per VMware summary:\u00a0It collects thousands of asset, security, and configuration data settings from each networked virtual environments system and virtual object, and from Windows, UNIX, and Linux server and workstation and stores them in a centralized Configuration Management Database (CMDB). By leveraging the information stored in the CMDB, IT administrators can ensure that company policies and the actions they perform are appropriate for the IT infrastructure that they support.<\/div>\n<div><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1480 size-full\" src=\"http:\/\/192.168.0.2\/wordpress\/wp-content\/uploads\/2018\/10\/screen-shot-2018-10-15-at-4-28-04-pm.png\" alt=\"Screen Shot 2018-10-15 at 4.28.04 PM\" width=\"1174\" height=\"894\" \/><\/div>\n<div>You can download vRealize Configuration Manager <a href=\"https:\/\/my.vmware.com\/web\/vmware\/details?downloadGroup=VCM-585&amp;productId=808\" target=\"_blank\" rel=\"noopener\">Here<\/a><\/div>\n<div>Here&#8217;s the latest <a href=\"https:\/\/docs.vmware.com\/en\/VMware-vRealize-Configuration-Manager\/5.8.5\/rn\/VMware-vRealize-Configuration-Manager-585-Release-Notes.html\" target=\"_blank\" rel=\"noopener\">release notes<\/a> and <a href=\"https:\/\/docs.vmware.com\/en\/VMware-vRealize-Configuration-Manager\/index.html\" target=\"_blank\" rel=\"noopener\">documentation<\/a><\/div>\n<div>Part of the challenges is that this product is no longer being developed so the latest version is to my understanding the last version that will be available for customers to use going forward.<\/div>\n<div><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1500\" src=\"http:\/\/192.168.0.2\/wordpress\/wp-content\/uploads\/2018\/10\/image2.png\" alt=\"image2\" width=\"1171\" height=\"954\" \/><\/div>\n<h2>vRealize Operations Manager and vRealize Orchestrator<\/h2>\n<div>If you&#8217;re not familiar with vRealize Operations Manager (vROPs), here&#8217;s a summary of the product along with one for vRealize Orchestrator (vRO) to start with.<\/div>\n<div>\n<p id=\"GUID-C60B9A2E-25B6-444F-84E4-B6CBB1631491__p_D3A5F0DE31D748ACA63D0B7C7D0A0138\" class=\"p\">VMware vRealize Operations Manager delivers intelligent operations management with application-to-storage visibility across physical, virtual, and cloud infrastructures. Using policy-based automation, operations teams automate key processes and improve IT efficiency.\u00a0 Using data collected from system resources (objects), vRealize Operations Manager identifies issues in any monitored system component, often before the customer notices a problem. vRealize Operations Manager also frequently suggests corrective actions you can take to fix the problem right away. For more challenging problems, vRealize Operations Manager offers rich analytical tools that allow you to review and manipulate object data to reveal hidden issues, investigate complex technical problems, identify trends, or drill down to gauge the health of a single object.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1481\" src=\"http:\/\/192.168.0.2\/wordpress\/wp-content\/uploads\/2018\/10\/vrops-quickstart-1024x506-1.jpg\" alt=\"vRops quickstart-1024x506\" width=\"1024\" height=\"506\" \/><\/p>\n<p>VMware vRealize Orchestrator is a drag-and-drop workflow software that simplifies the automation of complex IT tasks. It integrates with VMware vRealize Suite and vCloud Suite\u00ae to adapt and extend service delivery and operational management capabilities. This allows for more seamless integrations with existing infrastructure, tools and processes.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1482\" src=\"http:\/\/192.168.0.2\/wordpress\/wp-content\/uploads\/2018\/10\/vrealize-orchestrator.png\" alt=\"vRealize Orchestrator\" width=\"1638\" height=\"1383\" \/><\/p>\n<p>vROPs has the ability to report on vSphere Security Configuration Guide configuration parameters.\u00a0 This allows you to leverage the config options applicable to your environment within a policy and apply to your different vSphere environments to report on configuration drift.\u00a0 The challenge though is always around automating the remediation of those configuration drift parameters.\u00a0 vRO can integrate with vROPs in order to truly leverage the automated actions capabilities of vROPs.\u00a0 In other works, if you take the time to build out vRO workflows using the PowerCLI and VMware CLI scripts already provided in the vSphere Security Configuration Guide, you can leverage these workflows to automate the configuration drift of vSphere environment based on the vROPs Security Configuration Guide policy applied to your vSphere infrastructure.\u00a0 Based on my experience, I think VMware has an opportunity to build upon this.\u00a0 I&#8217;m working with our internal product management teams on a fling to start testing that will include a vROPs plugin that will leverage a pre-built set of orchestrator workflows.\u00a0 This will allow vSphere Operational and Security teams to use the automated actions capabilities of vROPs to ensure the vSphere infrastructure policy defined is applied at all times.\u00a0 This should reduce the amount of operational work required to keep your vSphere environment within policy and keep your security team&#8217;s scanning reports coming back with with a higher compliance rate.<\/p>\n<\/div>\n<div><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1501\" src=\"http:\/\/192.168.0.2\/wordpress\/wp-content\/uploads\/2018\/10\/screen-shot-2018-10-15-at-11-14-45-pm.png\" alt=\"Screen Shot 2018-10-15 at 11.14.45 PM\" width=\"1832\" height=\"966\" \/><\/div>\n<h2>Tenable<\/h2>\n<div>A quick description on Tenable and why it&#8217;s relevant to this article:<\/div>\n<div>Built on the leading Nessus technology from Tenable, Tenable.io brings clarity to your security and compliance posture through a fresh, asset-based approach that accurately tracks your resources and vulnerabilities, while accommodating dynamic assets like cloud and containers. Tenable.io maximizes visibility and insight and effectively prioritizes your vulnerabilities, while seamlessly integrating into your environment.<\/div>\n<div><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1483\" src=\"http:\/\/192.168.0.2\/wordpress\/wp-content\/uploads\/2018\/10\/screen-shot-2018-10-15-at-5-07-27-pm.png\" alt=\"Screen Shot 2018-10-15 at 5.07.27 PM\" width=\"1246\" height=\"594\" \/><\/div>\n<div>Tenable and Nessus security scanning products are used widely among most customers by security teams.\u00a0 Tenable makes a VMware vSphere Security Configuration Guide plugin which allows for security teams to independently scan IT infrastructure environments and provide a wholistic view of the entire environment.\u00a0 Based on the results of those scans, reports can be provided to IT teams to take action and work on remediation activities.<\/div>\n<div><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1484 size-full\" src=\"http:\/\/192.168.0.2\/wordpress\/wp-content\/uploads\/2018\/10\/screen-shot-2018-10-15-at-5-07-42-pm.png\" alt=\"Screen Shot 2018-10-15 at 5.07.42 PM\" width=\"2300\" height=\"1088\" \/><\/div>\n<div>Tenable and VMware Solution Brief can be viewed <a href=\"https:\/\/www.tenable.com\/sites\/drupal.dmz.tenablesecurity.com\/files\/solution-briefs\/Tenable-VMware-%28SB%29-EN-v3.pdf\" target=\"_blank\" rel=\"noopener\">here<\/a><\/div>\n<div>I bring this up again, as part of the main topic of this article, as it&#8217;s important to ensure you collaborate with your internal security teams on an operational model to ensure you&#8217;re meeting compliance objectives defined by your internal security and controls.\u00a0 You may or may not use Tenable, but more than likely, your security teams are using some method to scan your environment to ensure you&#8217;re meeting internal compliance policies.<\/div>\n<h1>Summary<\/h1>\n<div>To quickly recap, work with your security teams and jointly develop a vSphere Infrastructure Security Configuration policy using the data provided in the VMware Security Configuration Guides that&#8217;s applicable to your organization.\u00a0 Make sure you plan the right tools to automate and orchestrate the remediation of configuration drift and by partnering with your security teams, you&#8217;ll reduce the configuration drift alerts and provide compliance reporting numbers that will make your senior leadership satisfied and prove that you&#8217;re able to meet you&#8217;re corporate compliance goals and objectives.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Ask yourself the question, what&#8217;s my compliance policy for the company, HIPPA, PCI, SOX, DISA, STIG,&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":1632,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[13,19,31,39,45,54,66,67,70],"class_list":["post-29","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-vmware","tag-automation","tag-compliance","tag-hardening","tag-orchestration","tag-security","tag-vcenter","tag-vro","tag-vrops","tag-vsphere"],"_links":{"self":[{"href":"http:\/\/blog.virtualnate.net\/wordpress\/wp-json\/wp\/v2\/posts\/29","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/blog.virtualnate.net\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/blog.virtualnate.net\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/blog.virtualnate.net\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/blog.virtualnate.net\/wordpress\/wp-json\/wp\/v2\/comments?post=29"}],"version-history":[{"count":0,"href":"http:\/\/blog.virtualnate.net\/wordpress\/wp-json\/wp\/v2\/posts\/29\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/blog.virtualnate.net\/wordpress\/wp-json\/wp\/v2\/media\/1632"}],"wp:attachment":[{"href":"http:\/\/blog.virtualnate.net\/wordpress\/wp-json\/wp\/v2\/media?parent=29"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/blog.virtualnate.net\/wordpress\/wp-json\/wp\/v2\/categories?post=29"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/blog.virtualnate.net\/wordpress\/wp-json\/wp\/v2\/tags?post=29"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}