VCWN-06-000027 - The system must minimize access to the vCenter server.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

After someone has logged in to the vCenter Server system, it becomes more difficult to prevent what they can do. In general, logging in to the vCenter Server system should be limited to very privileged administrators, and then only for the purpose of administering vCenter Server or the host OS. Anyone logged in to the vCenter Server can potentially cause harm, either intentionally or unintentionally, by altering settings and modifying processes. They also have potential access to vCenter credentials, such as the SSL certificate.

NOTE: Nessus has not evaluted this check. It is included for informational purposes.

Solution

Remove all unnecessary users and/or groups from the local administrators group of the vCenter server.

See Also

http://iasecontent.disa.mil/stigs/zip/U_VMware_vSphere_6-0_vCenter_Server_for_Windows_V1R3_STIG.zip

Item Details

References: CAT|I, CCI|CCI-000366, Group-ID|V-63991, Rule-ID|SV-78481r1_rule, STIG-ID|VCWN-06-000027

Plugin: VMware

Control ID: 83b5975f98f16cc70457e1c395055a01566dac694e48479e6f1e3527eb251152