STIGQter STIGQter: STIG Summary: VMW vSphere 6.5 vCenter Server for Windows Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 22 Jan 2021:

The vCenter Server for Windows users must have the correct roles assigned.

DISA Rule

SV-216870r612237_rule

Vulnerability Number

V-216870

Group Title

SRG-APP-000233

Rule Version

VCWN-65-000051

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

To create a new role with specific permissions do the following:

From the vSphere Web Client go to Administration >> Access Control >> Roles. Click the green plus sign and enter a name for the role and select only the specific permissions required. Users can then be assigned to the newly created role.

Check Contents

From the vSphere Web Client go to Administration >> Access Control >> Roles.

View each role and verify the users and/or groups assigned to it.

or

From a PowerCLI command prompt while connected to the vCenter server run the following command:
Get-VIPermission | Sort Role | Select Role,Principal,Entity,Propagate,IsGroup | FT -Auto

Application service account and user required privileges should be documented.

If any user or service account has more privileges than required, this is a finding.

Vulnerability Number

V-216870

Documentable

False

Rule Version

VCWN-65-000051

Severity Override Guidance

From the vSphere Web Client go to Administration >> Access Control >> Roles.

View each role and verify the users and/or groups assigned to it.

or

From a PowerCLI command prompt while connected to the vCenter server run the following command:
Get-VIPermission | Sort Role | Select Role,Principal,Entity,Propagate,IsGroup | FT -Auto

Application service account and user required privileges should be documented.

If any user or service account has more privileges than required, this is a finding.

Check Content Reference

M

Target Key

4030

Comments