UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The VMM must prevent use of service and helper VMs not required to support proper VMM function.


Overview

Finding ID Version Rule ID IA Controls Severity
V-207473 SRG-OS-000368-VMM-001440 SV-207473r854647_rule Medium
Description
Control of program execution is a mechanism used to prevent execution of unauthorized programs. Some VMMs may provide a capability that runs counter to the mission or provides users with functionality that exceeds mission requirements. This includes functions and services installed at the VMM level. Some of the service and helper VMs, installed by default, may be harmful or may not be necessary to support essential organizational operations (e.g., key missions, functions). Removal of such VMs is not always possible; therefore, establishing a method of preventing VM activation is critical to maintaining a secure system baseline. Methods for complying with this requirement include restricting execution of VMs in certain environments, while preventing execution in other environments; or limiting execution of certain VM functionality based on organizationally defined criteria (e.g., privileges, subnets, sandboxed environments, or roles).
STIG Date
Virtual Machine Manager Security Requirements Guide 2023-09-12

Details

Check Text ( C-7730r365823_chk )
Verify the VMM prevents use of service and helper VMs not required to support proper VMM function.

If it does not, this is a finding.
Fix Text (F-7730r365824_fix)
Configure the VMM to prevent use of service and helper VMs not required to support proper VMM function.