1. Home
  2. Security Hardening
  3. DISA STIG VMware vSphere VCenter 6.5 V2R2
  4. VCWN-65-000026 – The vCenter Server for Windows must check the privilege re-assignment after restarts.

VCWN-65-000026 – The vCenter Server for Windows must check the privilege re-assignment after restarts.

Details

Check for privilege reassignment when you restart vCenter Server. If the user or user group that is assigned the Administrator role on the root folder cannot be verified as a valid user or group during a restart, the role is removed from that user or group. In its place, vCenter Server grants the Administrator role to the vCenter Single Sign-On account [email protected] This account can then act as the administrator.

Reestablish a named administrator account and assign the Administrator role to that account to avoid using the anonymous [email protected] account.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

As the SSO Administrator, log in to the vCenter Server and restore a legitimate administrator account per site-specific user/group/role requirements.

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Configuration Management.This control applies to the following type of system VMware.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles