Check: VCTR-67-000034
VMware vSphere 6.7 vCenter STIG:
VCTR-67-000034
(in versions v1 r4 through v1 r1)
Title
The vCenter Server must use unique service accounts when applications connect to vCenter. (Cat II impact)
Discussion
In order to not violate non-repudiation (i.e., deny the authenticity of who is connecting to vCenter), when applications need to connect to vCenter they must use unique service accounts.
Check Content
Verify that each external application that connects to vCenter has a unique service account dedicated to that application. For example, there should be separate accounts for Log Insight, Operations Manager, or anything else that requires an account to access vCenter. If any application shares a service account that is used to connect to vCenter, this is a finding.
Fix Text
For applications sharing service accounts, create a new service account to assign to the application so that no application shares a service account with another. When standing up a new application that requires access to vCenter, always create a new service account prior to installation and grant only the permissions needed for that application.
Additional Identifiers
Rule ID: SV-243096r879887_rule
Vulnerability ID: V-243096
Group Title: SRG-APP-000516
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
The organization implements the security configuration settings. |
Controls
Number | Title |
---|---|
CM-6 |
Configuration Settings |