VCWN-65-000064 - The vCenter Server for Windows must restrict access to cryptographic permissions.

Information

These permissions must be reserved for cryptographic administrators where VM encryption and/or vSAN encryption is in use. Catastrophic data loss can result from a poorly administered cryptography.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

From the vSphere Web Client go to Administration >> Access Control >> Roles

Highlight each role and click the pencil button if it is enabled. Remove the following permissions from any group other than Administrator and any site-specific cryptographic group(s):

Cryptographic Operations privileges
Global.Diagnostics
Host.Inventory.Add host to cluster
Host.Inventory.Add standalone host
Host.Local operations.Manage user groups

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-5_Y23M07_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-216883r879887_rule, STIG-ID|VCWN-65-000064, STIG-Legacy|SV-104661, STIG-Legacy|V-94831, Vuln-ID|V-216883

Plugin: VMware

Control ID: 516b12bf56e99c5549809a5826fcb05ffbddc56a32392eff001503ad3c9a2f03