STIGQter STIGQter: STIG Summary: VMware vSphere 6.7 vCenter Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 09 Mar 2021:

The vCenter Server must check the privilege reassignment after restarts.

DISA Rule

SV-243092r719519_rule

Vulnerability Number

V-243092

Group Title

SRG-APP-000516

Rule Version

VCTR-67-000026

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

As the SSO Administrator, log in to the vCenter Server and restore a legitimate Administrator account per site-specific user/group/role requirements.

Check Contents

Note: For vCenter Server Appliance, this is not applicable.

After the Windows server hosting the vCenter Server has been rebooted, a vCenter Server user or member of the user group granted the Administrator role must log in and verify the role permissions remain intact.

If the user and/or user group granted vCenter Administrator role permissions cannot be verified as intact, this is a finding.

Vulnerability Number

V-243092

Documentable

False

Rule Version

VCTR-67-000026

Severity Override Guidance

Note: For vCenter Server Appliance, this is not applicable.

After the Windows server hosting the vCenter Server has been rebooted, a vCenter Server user or member of the user group granted the Administrator role must log in and verify the role permissions remain intact.

If the user and/or user group granted vCenter Administrator role permissions cannot be verified as intact, this is a finding.

Check Content Reference

M

Target Key

5399

Comments