8.3.2 Minimize use of the VM console

Information

Grant access to the Virtual Machine console only when needed. Use custom roles to provide
fine grained permissions.

*Rationale*

The VM console enables you to connect to the console of a virtual machine, in effect seeing
what a monitor on a physical server would show. The VM console also provides power
management and removable device connectivity controls, which might potentially allow a
malicious user to bring down a virtual machine. In addition, it also has a performance
impact on the service console, especially if many VM console sessions are open
simultaneously.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

By default the vCenter roles 'Virtual Machine Power User' and 'Virtual Machine
Administrator' have the 'Virtual Machine.Interaction.Console Interaction' privilege. Do not
allow unauthorized individuals to have these roles on a virtual machine or folder of virtual
machines.1. From the vSphere Client, navigate to Administration\Roles section of vCenter.
2. Create a custom role and choose edit to enable only the minimum needed effective
privileges.
3. Next, select an object in the inventory.
4. Click the Permissions tab to view the user and role pair assignments for that object.
5. Remove any default 'Admin' or 'Power User' roles and assign the new custom role
as needed.

Default Value-The prescribed state is not the default state.

See Also

https://workbench.cisecurity.org/files/145

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-8

Plugin: VMware

Control ID: d5753003e12b7cf4c96b9e931cb9d00a1cc1b5a7d69f867c55b2934686dc5b28