Cutting the price of the embedded version of ESX will expand its user base, but it will also make customers vulnerable if they assume "appliance" means "secure out of the box." Now that ESXi has been released for free, it is even more important to concentrate on how to secure this version of ESX. Lowering the cost will undoubtedly increase the number of users in small- and mid-sized companies, and in the enterprise as well. Despite a design that calls for it to be pre-installed or embedded, I have blogged before that ESXi shouldn’t be treated only as an appliance, especially as regards security. Additional hardening steps are required to make it reasonably secure. There are very good guides out there now to harden the GNU/Linux service console specifically the Defense Information Systems Agency’s Secure Technology Installation Guide (DISA/STIG) and CIS Security Benchmark which both reference the UNIX and Linux guides respectively as a basis for ESX. SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe The guides concentrate on a subset of the entire virtual environment which includes ESX, and the VMs, but is not limited to them. However, the descriptions of what the guides actually cover are imprecise enough that one reader may think they cover only ESX and others will think they cover everything about VM security. But that is another discussion.The ‘Console’ for ESXi is an implementation of the Posix variant of Unix within a Busyboxframework, and it has many features that you will find in the full blown GNU/Linux service console, including Pluggable Authentication Modules, usernames and passwords, and daemons like Secure Shell (SSH). While enabling SSH within ESXi is not recommended by me nor supported by VMware, I imagine it is enabled on a majority of installs. This implies now that the hardening guidelines for SSH should be now used, as well as anything related directly to PAM modules, users, and passwords. But since with SSH enabled users can login to the system, we now need to be concerned about file permissions, and inadvertent information leakage about virtual machines, and the system itself.While ESXi is sold as an appliance and has some hardening guidelines from VMware, the Busybox ‘Console’ should also be hardened as well using standard GNU/Linux hardening guidelines specifically adjusted for ESXi. Virtualization expert Edward L. Haletky is the author of “VMWare ESX Server in the Enterprise: Planning and Securing Virtualization Servers,” Pearson Education (2008.) He recently left Hewlett-Packard, where he worked in the Virtualization, Linux, and High-Performance Technical Computing teams. Haletky owns AstroArch Consulting, providing virtualization, security, and network consulting and development. Haletky is also a champion and moderator for the VMware discussion forums, providing answers to security and configuration questions. Related content opinion CIOs worry about Gen AI – for all the right reasons Generative AI is poised to be the most consequential information technology of the decade. Plenty of promise. But expect novel new challenges to your enterprise data platform. By Mike Feibus Sep 20, 2023 7 mins CIO Generative AI Artificial Intelligence brandpost How Zero Trust can help align the CIO and CISO By Jaye Tillson, Field CTO at HPE Aruba Networking Sep 20, 2023 4 mins Zero Trust brandpost So, you’re ready to invest in Universal ZTNA. Here’s what you should know With careful evaluation and planning, implementing Universal ZTNA for all users offers a simple, effective way to enhance security across your entire network. By Peter Newton Sep 20, 2023 6 mins Zero Trust news ServiceNow boasts industry-first gen AI general availability with Vancouver release of Now Most major software vendors say they will incorporate generative AI in their applications; ServiceNow claims it will be the first to deliver the code. By Peter Sayer Sep 20, 2023 6 mins CIO Software Providers Zero Trust Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe