ESXI-67-000014 - The ESXi host SSH daemon must not permit root logins.

Information

Permitting direct root login reduces auditable information about who ran privileged commands on the system and also allows direct attack attempts on root's password.

Solution

From an SSH session connected to the ESXi host, or from the ESXi shell, add or correct the following line in '/etc/ssh/sshd_config':

Add or correct the following line in '/etc/ssh/sshd_config':

PermitRootLogin no

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-7_Y22M04_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|III, CCI|CCI-000366, Rule-ID|SV-239270r674739_rule, STIG-ID|ESXI-67-000014, Vuln-ID|V-239270

Plugin: Unix

Control ID: d5b7d5ff82f49a3cba2e39d1d736efb183b3df686b002ac1c706b2b5efac772c