1. Home
  2. Security Hardening
  3. DISA STIG VMware vSphere 6.7 VCenter V1R1
  4. VCTR-67-000047 – The vCenter Server must require an administrator to unlock an account locked due to excessive login failures.

VCTR-67-000047 – The vCenter Server must require an administrator to unlock an account locked due to excessive login failures.

Details

By requiring that SSO accounts be unlocked manually, the risk of unauthorized access via user password guessing, otherwise known as brute forcing, is reduced. When the account unlock time is set to zero, once an account is locked it can only be unlocked manually by an administrator.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

From the vSphere Client, go to Administration >> Single Sign-On >> Configuration >> Policies >> Lockout Policy.

Click ‘Edit’.

Set the ‘Unlock time’ to ‘0’ and click ‘OK’.

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Access Control.This control applies to the following type of system VMware.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles