Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
GEN001120-ESXI5-000051 | GEN001120-ESXI5-000051 | GEN001120-ESXI5-000051_rule | Medium |
Description |
---|
Even though communications are encrypted, an additional layer of security may be gained by extending the policy of not logging directly on as root. In addition, logging in with a user-specific account preserves the audit trail. |
STIG | Date |
---|---|
VMware ESXi v5 Security Technical Implementation Guide | 2013-01-15 |
Check Text ( C-GEN001120-ESXI5-000051_chk ) |
---|
Disable lock down mode. Enable the ESXi Shell. Execute the following command(s): # grep PermitRootLogin /etc/ssh/sshd_config If "PermitRootLogin" is set to "yes", this is a finding. Re-enable lock down mode. |
Fix Text (F-GEN001120-ESXI5-000051_fix) |
---|
Disable lock down mode. Enable the ESXi Shell. Execute the following command(s): # vi /etc/ssh/sshd_config Set "PermitRootLogin" to "no". Re-enable lock down mode. |