Information
The CIM system provides an interface that enables hardware-level management from remote applications via a set of standard APIs. Create a limited-privilege, read-only service account for CIM. Grant this role to the user on the ESXi server. Place this user in the Exception Users list. When/where write access is required, create/enable a limited-privilege, service account and grant only the minimum required privileges.
NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.
Solution
From the vSphere client, select the ESXi host; go to 'Local Users and Groups'. Create a limited-privileged, read-only service account for CIM. Place the CIM account into the 'root' group. Select Users and right-click in the user screen. Select 'Add', then Add a new user. If write access is required only grant the minimum required privileges. CIM accounts should be limited to the 'Host >> Config >> System Management' and 'Host >> CIM >> CIMInteraction' privileges.