Details
In order to not violate non-repudiation (i.e., deny the authenticity of who is connecting to vCenter), when applications need to connect to vCenter they should use unique service accounts.
NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.
Solution
For applications sharing service accounts create a new service account to assign to the application so that no application shares a service account with another.
When standing up a new application that requires access to vCenter always create a new service account prior to installation and grant only the permissions needed for that application.
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Configuration Management.This control applies to the following type of system VMware.
References
- 800-53|CM-6b.
- CAT|II
- CCI|CCI-000366
- Rule-ID|SV-216856r612237_rule
- STIG-ID|VCWN-65-000034
- STIG-Legacy|SV-104607
- STIG-Legacy|V-94777
- Vuln-ID|V-216856