Check: SRG-OS-000242-VMM-000840
Virtual Machine Manager SRG:
SRG-OS-000242-VMM-000840
(in versions v2 r2 through v1 r3)
Title
All guest VM network communications must be implemented through use of virtual network devices provisioned by the VMM. (Cat II impact)
Discussion
Mechanisms to detect and prevent unauthorized communication flow must be configured or provided as part of the VMM design. If information flow control is not enforced based on proper functioning of the VMM and its service, helper, and guest VMs, the VMM may become compromised. Information flow control regulates where information is allowed to travel between a VMM (and its guest VMs) and external systems. In some cases, the VMM may delegate interface device management to a service VM, but the VMM still maintains control of all information flows. The flow of all system information must be monitored and controlled so it does not introduce any unacceptable risk to the VMM, its guest VMs, or data.
Check Content
Verify all guest VM network communications are implemented through use of virtual network devices provisioned by the VMM. If they are not, this is a finding.
Fix Text
Configure all guest VM network communications to be implemented through use of virtual network devices provisioned by the VMM.
Additional Identifiers
Rule ID: SV-207416r958596_rule
Vulnerability ID: V-207416
Group Title: SRG-OS-000242
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001414 |
Enforce approved authorizations for controlling the flow of information between connected systems based on organization-defined information flow control policies. |
Controls
Number | Title |
---|---|
AC-4 |
Information Flow Enforcement |