Check: VCTR-67-000005
VMware vSphere 6.7 vCenter STIG:
VCTR-67-000005
(in versions v1 r4 through v1 r1)
Title
The vCenter Server users must have the correct roles assigned. (Cat II impact)
Discussion
Users and service accounts must only be assigned privileges they require. Least privilege requires that these privileges must only be assigned if needed to reduce risk of confidentiality, availability, or integrity loss.
Check Content
From the vSphere Client, go to Administration >> Access Control >> Roles. View each role and verify the users and/or groups assigned to it. or From a PowerCLI command prompt while connected to the vCenter server, run the following command: Get-VIPermission | Sort Role | Select Role,Principal,Entity,Propagate,IsGroup | FT -Auto Application service account and user required privileges should be documented. If any user or service account has more privileges than required, this is a finding.
Fix Text
To update a user's or group's permissions to an existing role with reduced permissions: From the vSphere Client, go to Administration >> Access Control >> Global Permissions. Select the user or group, click "Edit", change the assigned role, and click "OK". If permissions are assigned on a specific object, the role must be updated where it is assigned (for example, at the cluster level). To create a new role with reduced permissions: From the vSphere Client, go to Administration >> Access Control >> Roles. Click the green plus sign, enter a name for the role, and select only the specific permissions required. Users can then be assigned to the newly created role.
Additional Identifiers
Rule ID: SV-243076r879631_rule
Vulnerability ID: V-243076
Group Title: SRG-APP-000211
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001082 |
The information system separates user functionality (including user interface services) from information system management functionality. |
Controls
Number | Title |
---|---|
SC-2 |
Application Partitioning |