ESXI-67-000014 - The ESXi host SSH daemon must not permit root logins.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Permitting direct root login reduces auditable information about who ran privileged commands on the system and also allows direct attack attempts on root's password.

Solution

From an SSH session connected to the ESXi host, or from the ESXi shell, add or correct the following line in '/etc/ssh/sshd_config':

Add or correct the following line in '/etc/ssh/sshd_config':

PermitRootLogin no

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-7_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-17, CAT|III, CCI|CCI-000366, Rule-ID|SV-239270r674739_rule, STIG-ID|ESXI-67-000014, STIG-Legacy|SV-104061, STIG-Legacy|V-93975, Vuln-ID|V-239270

Plugin: Unix

Control ID: d2a3563df9deea4ada3e72e8b580ceed02fffca0ec7f263c52593c122cb8b7ad