VMCH-06-000037 - The system must prevent unauthorized removal, connection and modification of devices.

Information

In a virtual machine, users and processes without root or administrator privileges can connect or disconnect devices, such as network adaptors and CD-ROM drives, and can modify device settings. Use the virtual machine settings editor or configuration editor to remove unneeded or unused hardware devices. If you want to use the device again, you can prevent a user or running process in the virtual machine from connecting, disconnecting, or modifying a device from within the guest operating system. By default, a rogue user with nonadministrator privileges in a virtual machine can: 1. Connect a disconnected CD-ROM drive and access sensitive information on the media left in the drive 2. Disconnect a network adaptor to isolate the virtual machine from its network, which is a denial of service 3. Modify settings on a device

Solution

From the vSphere Client select the Virtual Machine right click and go to Edit Settings >> VM Options Tab >> Advanced >> Configuration Parameters. Find the isolation.device.connectable.disable value and set it to true. If the setting does not exist click 'Add Row' to add the setting to the virtual machine.

Note: The VM must be powered off to configure the advanced settings through the vSphere Client so it is recommended to configure these settings with PowerCLI as it can be done while the VM is powered on.

or

From a PowerCLI command prompt while connected to the ESXi host or vCenter server run the following command:

If the setting does not exist run:

Get-VM 'VM Name' | New-AdvancedSetting -Name isolation.device.connectable.disable -Value true

If the setting exists run:

Get-VM 'VM Name' | Get-AdvancedSetting -Name isolation.device.connectable.disable | Set-AdvancedSetting -Value true

See Also

http://iasecontent.disa.mil/stigs/zip/U_VMware_vSphere_6-0_Virtual_Machine_V1R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Group-ID|V-64111, Rule-ID|SV-78601r1_rule, STIG-ID|VMCH-06-000037, Vuln-ID|V-64111

Plugin: VMware

Control ID: 3b5dbed4d3f7bc855fa29ad46f85f3a47f3f274792f3c8958fefc138b18f0a9b