8.3.2 Ensure use of the VM console is limited

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The VM console enables you to connect to the console of a VM, in effect seeing what a monitor on a physical server would show. The VM console also provides power management and removable device connectivity controls. Instead of the VM console, use native remote management services, such as terminal services and ssh, to interact with VMs. Grant access to the VM console only when needed, and use custom roles to provide fine-grained permissions for those people who do need access. By default, the vCenter roles 'Virtual Machine Power User' and 'Virtual Machine Administrator' have the 'Virtual Machine.Interaction.Console Interaction' privilege.

Rationale:

The VM console could be misused to eavesdrop on VM activity, cause VM outages, and negatively affect the performance of the console, especially if many VM console sessions are open simultaneously.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

To properly limit use of the VM console, perform the following steps:

From the vSphere Client, navigate to vCenter --> Administration --> Roles.

Create a custom role and choose Edit to enable only the minimum needed effective privileges.

Next, select an object in the inventory.

Click the Permissions tab to view the user and role pair assignments for that object.

Remove any default 'Admin' or 'Power User' roles, and assign the new custom role as needed.

See Also

https://workbench.cisecurity.org/files/3511