UCF STIG Viewer Logo

The operating system must manage information system identifiers for users and devices by disabling the user identifier after an organization-defined time period of inactivity.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-OS-000118-ESXI5-PNF SRG-OS-000118-ESXI5-PNF SRG-OS-000118-ESXI5-PNF_rule Medium
Description
Inactive user accounts pose a risk to systems and applications. Owners of inactive accounts will not notice if unauthorized access to their user account has been obtained. Attackers able to exploit an inactive account can potentially obtain and maintain undetected access to the operating system. Operating systems need to track periods of user inactivity and disable accounts after an organization-defined period of inactivity. Such a process greatly reduces the risk that accounts will be misused, hijacked, or data compromised. Applicable, but permanent not-a-finding - root is the only local user account, and should never be considered inactive. All other accounts (excepting vpxuser, which is password-updated every 30 days or less) are required to be Active Directory accounts.
STIG Date
VMware ESXi v5 Security Technical Implementation Guide 2013-01-15

Details

Check Text ( C-SRG-OS-000118-ESXI5-PNF_chk )
ESXi supports this requirement and cannot be configured to be out of compliance. This is a permanent not a finding.
Fix Text (F-SRG-OS-000118-ESXI5-PNF_fix)
This requirement is permanent not a finding. No fix is required.