loading…
Search for a command to run...
loading…
VMware vSphere compliance and hardening — read-only baseline scanning plus drift detection across CIS, DISA STIG, vSphere SCG, China DJCP 2.0, and PCI-DSS frame
VMware vSphere compliance and hardening — read-only baseline scanning plus drift detection across CIS, DISA STIG, vSphere SCG, China DJCP 2.0, and PCI-DSS frameworks. Includes LLM-powered remediation suggestions; apply-side gated through the vmware-pilot approval workflow.
Disclaimer: Community-maintained open-source project. Not affiliated with, endorsed by, or sponsored by VMware, Inc. or Broadcom Inc. "VMware", "vSphere", "ESXi", and "NSX" are trademarks of Broadcom. Source code is publicly auditable at github.com/zw008/VMware-Harden under the MIT license.
AI-native VMware compliance and baseline enforcement. Sibling to the vmware-* skill family.
Production-ready compliance platform with 6 built-in baselines (CIS ESXi, vSphere SCG v8, 等保 2.0 三级, PCI-DSS 4.0, EU NIS2, BSI IT-Grundschutz), 87 rules, multi-vCenter Twin, drift detection, LLM Remediation Advisor, MCP server with 6 audited tools, web dashboard, and vmware-harden doctor environment diagnostics.
uv tool install vmware-harden
# List built-in baselines
vmware-harden baseline list
# Run a scan
vmware-harden scan --target <vcenter-name> --baseline cis-vmware-esxi-8.0-subset
# Or use 等保 2.0 三级 (国内合规独家)
vmware-harden scan --target <vc> --baseline dengbao-2.0-level3-vmware
# View results
vmware-harden report
vmware-harden drift
# Generate remediation suggestions
export ANTHROPIC_API_KEY=... # optional; falls back to mock without
vmware-harden advise --all-critical
# Web dashboard
vmware-harden web --port 8080 # → http://127.0.0.1:8080
| Baseline | Rules | Applies to | Source |
|---|---|---|---|
cis-vmware-esxi-8.0-subset |
20 | host | CIS Benchmark v1.0 |
vsphere-scg-v8-subset |
15 | host, vm | VMware vcf-security-and-compliance-guidelines |
dengbao-2.0-level3-vmware |
20 | host, vm, datastore, dfw_rule | GB/T 22239-2019 三级 |
pci-dss-4.0-vmware |
10 | host, dfw_rule | PCI-DSS v4.0 |
eu-nis2-vmware |
12 | host, dfw_rule | EU NIS2 Directive (Articles 21/23, Annex I) |
bsi-itgs-basisabsicherung-vmware |
10 | host | BSI IT-Grundschutz (OPS.1.1.4 + SYS.1.1) |
vmware-harden baseline validate ./my-strict.yaml
vmware-harden baseline import ./my-strict.yaml --name my-strict-cis
vmware-harden scan --target <vc> --baseline my-strict-cis
YAML supports extends: for inheriting from a built-in baseline. See skills/vmware-harden/references/cli-reference.md.
vmware-harden-mcp # stdio MCP server
Configure your MCP client with one of examples/mcp-configs/*.json. 6 read-only tools: list_baselines, list_violations, get_remediation, list_drift_events, get_baseline_rules, scan_target.
~/.vmware-harden/twin.duckdb. Multi-target safe via target prefix on all node IDs.extra="forbid"), extends: inheritance, user-dir override.@vmware_tool from family vmware-policy.export VMWARE_HARDEN_LAB_TARGET=<your-vc>
pytest tests/eval/regression -v -m lab
@vmware_tool audit decoratorvmware-harden doctor for environment diagnosticsdocs/plans/2026-05-03-vmware-harden-design.mddocs/plans/2026-05-04-vmware-harden-{m1,m2,m3}-plan.md/Users/zw/testany/myskills/CLAUDE.mdMIT
Run in your terminal:
claude mcp add vmware-harden -- npx