SV-243119r719600_rule
V-243119
SRG-APP-000516
VCTR-67-000064
CAT II
10
From the vSphere Client, go to Administration >> Access Control >> Roles.
Highlight each role and click the pencil button if it is enabled.
Remove the following permissions from any group other than Administrator and any site-specific cryptographic group(s):
Cryptographic Operations privileges
Global.Diagnostics
Host.Inventory.Add host to cluster
Host.Inventory.Add standalone host
Host.Local operations.Manage user groups
From the vSphere Client, go to Administration >> Access Control >> Roles.
Highlight each role and click the "Privileges" button in the right pane.
Verify that only the Administrator and any site-specific cryptographic group(s) have the following permissions:
Cryptographic Operations privileges
Global.Diagnostics
Host.Inventory.Add host to cluster
Host.Inventory.Add standalone host
Host.Local operations.Manage user groups
or
From a PowerCLI command prompt while connected to the vCenter server, run the following command:
$roles = Get-VIRole
ForEach($role in $roles){
$privileges = $role.PrivilegeList
If($privileges -match "Crypto*" -or $privileges -match "Global.Diagnostics" -or $privileges -match "Host.Inventory.Add*" -or $privileges -match "Host.Local operations.Manage user groups"){
Write-Host "$role has Cryptographic privileges"
}
}
If any role other than Administrator and any site-specific group(s) have any of these permissions, this is a finding.
V-243119
False
VCTR-67-000064
From the vSphere Client, go to Administration >> Access Control >> Roles.
Highlight each role and click the "Privileges" button in the right pane.
Verify that only the Administrator and any site-specific cryptographic group(s) have the following permissions:
Cryptographic Operations privileges
Global.Diagnostics
Host.Inventory.Add host to cluster
Host.Inventory.Add standalone host
Host.Local operations.Manage user groups
or
From a PowerCLI command prompt while connected to the vCenter server, run the following command:
$roles = Get-VIRole
ForEach($role in $roles){
$privileges = $role.PrivilegeList
If($privileges -match "Crypto*" -or $privileges -match "Global.Diagnostics" -or $privileges -match "Host.Inventory.Add*" -or $privileges -match "Host.Local operations.Manage user groups"){
Write-Host "$role has Cryptographic privileges"
}
}
If any role other than Administrator and any site-specific group(s) have any of these permissions, this is a finding.
M
5399