ESXI5-VM-000044 - The system must minimize use of the VM console.

Information

The VM console enables a connection to the console of a virtual machine, in effect seeing what a monitor on a physical server would show. The VM console also provides power management and removable device connectivity controls, which might potentially allow a malicious user to bring down a virtual machine. In addition, it also has a performance impact on the service console, especially if many VM console sessions are open simultaneously.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Develop a policy prohibiting the use of a VM console for performing management services. This policy should include procedures for the use of SSH and Terminal Management services for VM management. Where SSH and Terminal Management services prove insufficient to troubleshoot a VM, access to the VM console may be temporarily granted for simultaneous.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_ESXi5_Virtual_Machine_V2R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Group-ID|V-39498, Rule-ID|SV-250716r799610_rule, STIG-ID|ESXI5-VM-000044, STIG-Legacy|SV-51356, STIG-Legacy|V-39498, Vuln-ID|V-250716

Plugin: VMware

Control ID: 2414ae42523b24b84b0b2ecff733b9fc0f4a145a744e67b1f86bc5d9d0232d82