VCENTER-000013 - Access to SSL certificates must be monitored.

Information

The directory that contains the SSL certificates only needs to be accessed by the service account user on a regular basis. Occasionally, the vCenter Server system administrator might need to access it for support purposes. The SSL certificate can be used to impersonate vCenter and decrypt the vCenter database password.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Set up Windows event log monitoring to alert on nonservice account access to the certificates directory.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_ESXi5_vCenter_Server_V2R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Group-ID|V-39551, Rule-ID|SV-250733r799889_rule, STIG-ID|VCENTER-000013, STIG-Legacy|SV-51409, STIG-Legacy|V-39551, Vuln-ID|V-250733

Plugin: VMware

Control ID: 976407fe2c1a61d99a801047f782675bf6ce8c394e4929943cc840c9b9b76da2