UCF STIG Viewer Logo

The operating system, for PKI-based authentication must map the authenticated identity to the user account.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-OS-000068-ESXI5-PF SRG-OS-000068-ESXI5-PF SRG-OS-000068-ESXI5-PF_rule Medium
Description
The cornerstone of the PKI is the private key used to encrypt or digitally sign information. The key by itself is a cryptographic value that does not contain specific user information. The authenticated identity must be mapped to an account for access and authorization decisions. Permanent finding - This function is not implemented for a hypervisor.
STIG Date
VMware ESXi v5 Security Technical Implementation Guide 2013-01-15

Details

Check Text ( C-SRG-OS-000068-ESXI5-PF_chk )
ESXi does not support this requirement. This is a permanent finding.
Fix Text (F-SRG-OS-000068-ESXI5-PF_fix)
This requirement is a permanent finding and cannot be fixed. An appropriate mitigation for the system must be implemented but this finding cannot be considered fixed.