STIGQter STIGQter: STIG Summary: VMW vSphere 6.5 vCenter Server for Windows Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 22 Jan 2021:

The vCenter Server for Windows must check the privilege re-assignment after restarts.

DISA Rule

SV-216848r612237_rule

Vulnerability Number

V-216848

Group Title

SRG-APP-000516

Rule Version

VCWN-65-000026

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

As the SSO Administrator, log in to the vCenter Server and restore a legitimate administrator account per site-specific user/group/role requirements.

Check Contents

After the Windows server hosting the vCenter Server has been rebooted, a vCenter Server user or member of the user group granted the administrator role must log in and verify the role permissions remain intact.

If the user and/or user group granted vCenter administrator role permissions cannot be verified as intact, this is a finding.

Vulnerability Number

V-216848

Documentable

False

Rule Version

VCWN-65-000026

Severity Override Guidance

After the Windows server hosting the vCenter Server has been rebooted, a vCenter Server user or member of the user group granted the administrator role must log in and verify the role permissions remain intact.

If the user and/or user group granted vCenter administrator role permissions cannot be verified as intact, this is a finding.

Check Content Reference

M

Target Key

4030

Comments