VCENTER-000020 - System must restrict unauthorized vSphere users from being able to execute commands within the guest virtual machine

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

By default, vCenter Server 'Administrator' role allows users to interact with files and programs inside a virtual machine's guest operating system. Least Privilege requires that this privilege should not be granted to any users who are not authorized, to reduce risk of Guest confidentiality, availability, or integrity loss. To prevent such loss, a non-guest access role must be created without these privileges. This role is for users who need administrator privileges excluding those allowing file and program interaction within the guests.

Solution

Create a role to manage vCenter without the Guest Access Control (example 'Administrator No Guest Access'), and that this role is assigned to administrators who should not have Guest file and program interaction privileges.
Log into the vCenter Server System using the vSphere Client as a vCenter Server System Administrator.
Go to 'Home>> Administration>> Roles' and verify a role exists for administrators with Guest access removed.
Right click on the role name and select 'Edit'. Verify under 'All Privileges>> Virtual Machines' the 'Guest Operations' checkbox is unchecked.
Create account(s) requiring administrator privileges without Guest access privileges.

See Also

http://iase.disa.mil/stigs/os/virtualization/Pages/index.aspx

Item Details

References: CAT|II, CCI|CCI-000366, Group-ID|V-39558, Rule-ID|SV-51416r1_rule, STIG-ID|VCENTER-000020, Vuln-ID|V-39558

Plugin: VMware

Control ID: decbefd8acbbcc9f23aafc2ddf76b728bb5a2cfe948eceebfeb1890c6ab770b7