UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Virtual machines are removed from the site without approval documentation.


Overview

Finding ID Version Rule ID IA Controls Severity
V-15903 ESX1070 SV-16845r1_rule ECSC-1 Medium
Description
From a theft perspective, virtual machines are easy to copy and move to a person’s USB drive, portable hard drive, etc. An insider could potentially move the organization’s entire data center on any type of removable media that had sufficient space.
STIG Date
VMware ESX 3 Policy 2016-05-03

Details

Check Text ( C-16263r1_chk )
Request the approval documentation from the IAO/SA that the site uses for all virtual machines taken off site. If no documentation exists, this is a finding.
Fix Text (F-15864r1_fix)
Create documentation to use for virtual machines taken off site.