3.22 (L1) Host must deny shell access for the dcui account

Information

The dcui account, utilized for process isolation for the Direct Console User Interface (DCUI), possesses shell access which, when deactivated, minimizes the attack surface. This action is a proactive measure to enhance system security.

Deactivating shell access for the dcui account reduces the avenues of exploitation available to potential attackers. It is a prudent step towards a hardened security posture.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Impact:

There is no functional impact noted from denying shell access for the dcui account, making it a low-risk yet effective security control.

See Also

https://workbench.cisecurity.org/benchmarks/15784

Item Details

Category: CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

References: 800-53|CM-7, 800-53|CM-7(1), 800-53|CM-7(5), 800-53|CM-10, 800-53|SI-7, 800-53|SI-7(1), CSCv7|2.7, CSCv7|2.8, CSCv7|2.9

Plugin: VMware

Control ID: 40f3a979f46c3008f6323cd99f4c0d5decaf021516f0864794161ac9e883e9e8