VM: disable-independent-nonpersistent

Information

The security issue with nonpersistent disk mode is that successful attackers, with a simple shutdown or reboot, might undo or remove any traces that they were ever on the machine. To safeguard against this risk, you should set production virtual machines to use either persistent disk mode or nonpersistent disk mode; additionally, make sure that activity within the VM is logged remotely on a separate server, such as a syslog server or equivalent Windows-based event collector. Without a persistent record of activity on a VM, administrators might never know whether they have been attacked or hacked.

Solution

Set scsiX:Y.mode to a value other than 'independent nonpersistent' in the virtual machine configuration file or remove the scsi disk from the virtual machine.

See Also

http://www.vmware.com/support/support-resources/hardening-guides.html

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-7

Plugin: VMware

Control ID: ede67b2392f1702731a5880d909d58eaf2fa7b8c464efaf8c2268aca14275690