ESXI-70-000031 - The ESXi host must be configured with a sufficiently complex password policy.

Information

To enforce the use of complex passwords, minimum numbers of characters of different classes are mandated.

The use of complex passwords reduces the ability of attackers to successfully obtain valid passwords using guessing or exhaustive search techniques. Complexity requirements increase the password search space by requiring users to construct passwords from a larger character set than they may otherwise use.

Satisfies: SRG-OS-000069-VMM-000360, SRG-OS-000070-VMM-000370, SRG-OS-000071-VMM-000380, SRG-OS-000072-VMM-000390, SRG-OS-000078-VMM-000450, SRG-OS-000266-VMM-000940

Solution

From the vSphere Client, go to Hosts and Clusters.

Select the ESXi Host >> Configure >> System >> Advanced System Settings.

Click 'Edit'. Select the 'Security.PasswordQualityControl' value and configure it to 'similar=deny retry=3 min=disabled,disabled,disabled,disabled,15'.

or

From a PowerCLI command prompt while connected to the ESXi host, run the following command:

Get-VMHost | Get-AdvancedSetting -Name Security.PasswordQualityControl | Set-AdvancedSetting -Value 'similar=deny retry=3 min=disabled,disabled,disabled,disabled,15'

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_7-0_Y23M07_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(1)(a), 800-53|IA-5(1)(b), CAT|II, CCI|CCI-000192, CCI|CCI-000193, CCI|CCI-000194, CCI|CCI-000195, CCI|CCI-000205, CCI|CCI-001619, Rule-ID|SV-256397r885972_rule, STIG-ID|ESXI-70-000031, Vuln-ID|V-256397

Plugin: VMware

Control ID: dd2df0b5deb6c36e2d1a7490a8441b5f3e9fe810f72cdc2ebd7b553c6ea9b956