Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
GEN003320-ESXI5-PNF | GEN003320-ESXI5-PNF | GEN003320-ESXI5-PNF_rule | Medium |
Description |
---|
Default accounts, such as bin, sys, adm, uucp, daemon, and others, should never have access to the "at" facility. This would create a possible vulnerability open to intruders or malicious users. Applicable, but permanent not-a-finding - No "at" command. |
STIG | Date |
---|---|
VMware ESXi v5 Security Technical Implementation Guide | 2013-01-15 |
Check Text ( C-GEN003320-ESXI5-PNF_chk ) |
---|
ESXi supports this requirement and cannot be configured to be out of compliance. This is a permanent not a finding. |
Fix Text (F-GEN003320-ESXI5-PNF_fix) |
---|
This requirement is permanent not a finding. No fix is required. |