SRG-OS-99999-ESXI5-000135 - The system must disable DCUI to prevent local administrative control.

Information

The DCUI allows for low-level host configuration, such as configuring IP address, hostname, and root password, as well as diagnostic capabilities, such as enabling the ESXi shell, viewing log files, restarting agents, and resetting configurations. Actions performed from the DCUI are not tracked by vCenter Server. Even if Lockdown Mode is enabled, someone with the root password can perform administrative tasks in the DCUI bypassing RBAC and auditing controls provided through vCenter. DCUI access can be disabled. Disabling it prevents all local activity and thus forces actions to be performed in vCenter Server where they can be centrally audited and monitored.

Solution

From the vSphere Client, select the host and select 'Configuration >> Security Profile'. In the services section select 'Properties'. Select 'Direct Console UI' and click 'Options'. From the pop-up stop the DCUI service and set the startup policy to 'start and stop manually'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_ESXi5_Server_V2R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Group-ID|V-39294, Rule-ID|SV-250654r798961_rule, STIG-ID|SRG-OS-99999-ESXI5-000135, STIG-Legacy|SV-51110, STIG-Legacy|V-39294, Vuln-ID|V-250654

Plugin: VMware

Control ID: c849c98e170ac180ca3980828d76400900d105b3285afa13d2e8b5cbaf5fee42