SRG-OS-000033-ESXI5 - The operating system must use cryptography to protect the confidentiality of remote access sessions.

Information

Remote network access is accomplished by leveraging common communication protocols and establishing a remote connection. These connections will occur over the public Internet.

Remote access is any access to an organizational information system by a user (or an information system) communicating through an external, non-organization-controlled network (e.g., the Internet). Examples of remote access methods include dial-up, broadband, and wireless.

Using cryptography ensures confidentiality of the remote access connections.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Disable lock down mode.
Enable the ESXi Shell.

Edit the SSH daemon configuration and add/modify the 'Protocol' configuration for Protocol 2 only.
# vi /etc/ssh/sshd_config

Re-enable lock down mode.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_ESXi5_Server_V2R1_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-17(2), CAT|I, CCI|CCI-000068, Group-ID|V-39411, Rule-ID|SV-250616r798847_rule, STIG-ID|SRG-OS-000033-ESXI5, STIG-Legacy|SV-51269, STIG-Legacy|V-39411, Vuln-ID|V-250616

Plugin: VMware

Control ID: bbd2baac4494cdf278cee0c57462d80f58aa6e2d7541a0cf6835d9a40f6f9ea9