From 8100fde6910ba3866521cbed7ceaa4ccf23483c5 Mon Sep 17 00:00:00 2001 From: simeononsecurity <4913771+simeononsecurity@users.noreply.github.com> Date: Fri, 15 Dec 2023 03:39:33 +0000 Subject: [PATCH] Update index.en.md --- .../index.en.md | 13 ++++++++++++- 1 file changed, 12 insertions(+), 1 deletion(-) diff --git a/content/articles/how-to-use-powercli-to-run-the-vmware-stigs/index.en.md b/content/articles/how-to-use-powercli-to-run-the-vmware-stigs/index.en.md index 98305938cc160..85b2781dc50e3 100644 --- a/content/articles/how-to-use-powercli-to-run-the-vmware-stigs/index.en.md +++ b/content/articles/how-to-use-powercli-to-run-the-vmware-stigs/index.en.md @@ -39,7 +39,6 @@ The VMware ESXi STIG provides guidelines for securing ESXi hosts. By automating Before proceeding with the automation, it is important to consider the following points: -- **The [DOD STIG VIB](https://flings.vmware.com/dod-security-technical-implementation-guide-stig-esxi-vib) should be installed beforehand.** - **Ensure that no virtual machine or guest on the ESXi host or cluster requires CD, USB, or Floppy Disk functionality.** - **All ESXi hosts and guests tied to vCenter need to be STIG'ed.** - **Troubleshooting skills are necessary to address any issues that may arise during the process.** @@ -294,6 +293,18 @@ Again, this script is provided as an example, and you should modify it according _____ +## Extras + +- **The [DOD STIG VIB](https://flings.vmware.com/dod-security-technical-implementation-guide-stig-esxi-vib) used to exist for 5.0-6.7 But is no longer available.** +- [Ryan Lakey](https://core.vmware.com/users/ryan-lakey) has some great guidance on implementing the DoD VMWare STIGS, and we highly suggest you read them. + - [VMware vSphere 8 STIG](https://core.vmware.com/resource/vmware-vsphere-8-stig) + - [VMware vSphere 7 STIG](https://core.vmware.com/vsphere-7-stig) + - [VMware vSphere 6.7 STIG](https://core.vmware.com/vmware-vsphere-67-stig) + - [VMware STIG Powercli](https://github.com/rlakey/vmware-stig-powercli) + - [vmware-vcsa-6.7-stig-baseline](https://github.com/rlakey/vmware-vcsa-6.7-stig-baseline) + - [vmware-vm-6.7-stig-baseline](https://github.com/rlakey/vmware-vm-6.7-stig-baseline) +_____ + ## Conclusion **Implementing the VMware STIG is crucial for enhancing the security of VMware infrastructure and achieving compliance with relevant regulations. PowerCLI enables automation and simplifies the process of applying STIG controls to both ESXi hosts and VMs.**