UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The VMM must prevent inappropriate use of redundant guest VMs.


Overview

Finding ID Version Rule ID IA Controls Severity
V-207474 SRG-OS-000368-VMM-001450 SV-207474r958804_rule Medium
Description
Control of program execution is a mechanism used to prevent execution of unauthorized programs. Some VMMs may provide a capability that runs counter to the mission or provides users with functionality that exceeds mission requirements. This includes functions and services installed at the VMM level. Some of the guest VMs, set up for redundancy, may be harmful or may not be necessary to support essential organizational operations (e.g., key missions, functions) at the present time. Removal of such VMs is not always possible; therefore, establishing a method of preventing VM activation is critical to maintaining a secure system baseline. Methods for complying with this requirement include restricting execution of VMs in certain environments, while preventing execution in other environments; or limiting execution of certain VM functionality based on organizationally defined criteria (e.g., privileges, subnets, sandboxed environments, or roles).
STIG Date
Virtual Machine Manager Security Requirements Guide 2024-05-28

Details

Check Text ( C-7731r365826_chk )
Verify the VMM prevents inappropriate use of redundant guest VMs.

If it does not, this is a finding.
Fix Text (F-7731r365827_fix)
Configure the VMM to prevent inappropriate use of redundant guest VMs.