SRG-OS-99999-ESXI5-000138 - The system must disable SSH.

Information

The ESXi Shell is an interactive command line interface (CLI) available at the ESXi server console. The ESXi shell provides temporary access to commands essential for server maintenance. Intended primarily for use in break-fix scenarios, the ESXi shell is well suited for checking and modifying configuration details, not always generally accessible, using the vSphere Client. The ESXi shell is accessible remotely using SSH. Under normal operating conditions, SSH access to the host must be disabled. As with the ESXi shell, SSH is also intended only for temporary use during break-fix scenarios. SSH must therefore be disabled under normal operating conditions and must only be enabled for diagnostics or troubleshooting. Remote access to the host must therefore be limited to the vSphere Client at all other times.

Solution

From the vSphere client, select the ESXi host, go to 'Configuration >> Security Profile'. In the 'Services' section select 'Properties'. Select 'SSH', 'Options...' and configure the 'SSH' option to 'Start and stop manually'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_ESXi5_Server_V2R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Group-ID|V-39390, Rule-ID|SV-250657r798970_rule, STIG-ID|SRG-OS-99999-ESXI5-000138, STIG-Legacy|SV-51248, STIG-Legacy|V-39390, Vuln-ID|V-250657

Plugin: VMware

Control ID: b6098a7d0b92e3af71ab645b7b9fc1f7f07bcf9d430a6593aaae013765cdc6ab