1. Home
  2. Security Hardening
  3. DISA STIG VMware vSphere VCenter 6.5 V2R2
  4. VCWN-65-000027 – The vCenter Server for Windows must minimize access to the vCenter server.

VCWN-65-000027 – The vCenter Server for Windows must minimize access to the vCenter server.

Details

After someone has logged in to the vCenter Server system, it becomes more difficult to prevent what they can do. In general, logging in to the vCenter Server system should be limited to very privileged administrators, and then only for the purpose of administering vCenter Server or the host OS. Anyone logged in to the vCenter Server can potentially cause harm, either intentionally or unintentionally, by altering settings and modifying processes. They also have potential access to vCenter credentials, such as the SSL certificate.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Remove all unnecessary users and/or groups from the local administrators group of the vCenter server.

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Configuration Management.This control applies to the following type of system VMware.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles