UCF STIG Viewer Logo

Accounts must be locked upon 35 days of inactivity.


Overview

Finding ID Version Rule ID IA Controls Severity
GEN000760-ESXI5-PNF GEN000760-ESXI5-PNF GEN000760-ESXI5-PNF_rule Medium
Description
On some systems, accounts with disabled passwords still allow access using rcp, remsh, or rlogin through equivalent remote hosts. All that is required is the remote host name and the user name match an entry in a hosts.equiv file and have a .rhosts file in the user directory. Using a shell called /bin/false or /dev/null (or an equivalent) will add a layered defense. Applicable, but permanent not-a-finding - There is only 1 local account on ESXi-v5 (root), which must never be disabled. All other accounts (excepting vpxuser which is automated by vCenter) are Active Directory. The root account login is locked in Lockdown Mode (a requirement).
STIG Date
VMware ESXi v5 Security Technical Implementation Guide 2013-01-15

Details

Check Text ( C-GEN000760-ESXI5-PNF_chk )
ESXi supports this requirement and cannot be configured to be out of compliance. This is a permanent not a finding.
Fix Text (F-GEN000760-ESXI5-PNF_fix)
This requirement is permanent not a finding. No fix is required.