UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The operating system must implement a configurable capability to automatically disable the operating system if any of the organization-defined lists of security violations are detected.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-OS-000122-ESXI5-PF SRG-OS-000122-ESXI5-PF SRG-OS-000122-ESXI5-PF_rule Medium
Description
When responding to a security incident a capability must exist allowing authorized personnel to disable a particular system if the system exhibits a security violation and the organization determines such an action is warranted. Organizations shall define a list of security violations warranting an immediate disabling of a system. Permanent finding - ESXi v5 does not support this automation requirement.
STIG Date
VMware ESXi v5 Security Technical Implementation Guide 2013-01-15

Details

Check Text ( C-SRG-OS-000122-ESXI5-PF_chk )
ESXi does not support this requirement. This is a permanent finding.
Fix Text (F-SRG-OS-000122-ESXI5-PF_fix)
This requirement is a permanent finding and cannot be fixed. An appropriate mitigation for the system must be implemented but this finding cannot be considered fixed.