Strong access controls are critical to securing data. Access control policies (e.g., identity-based policies, role-based policies, attribute-based policies) and access enforcement mechanisms (e.g., access control lists, access control matrices, cryptography) must be employed by the operating system when applicable to control access between users (or processes acting on behalf of users) and objects (e.g., devices, files, records, processes, programs, domains) in the operating system. Permanent not a finding - Lockdown mode (required) limits access via the vpxuser proxy. The proxy's password is 32 (randomly selected) characters, SHA1 encrypted, not configurable, and changed every 30 days "or" sooner when/if a new host is configured/controlled by the vCenter Server. This password is obfuscated on vCenter. |