UCF STIG Viewer Logo

The operating system must notify the user of the number of unsuccessful login/access attempts that occur during organization-defined time period.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-OS-000234-ESXI5-PF SRG-OS-000234-ESXI5-PF SRG-OS-000234-ESXI5-PF_rule Medium
Description
Users need to be aware of activity that occurs regarding their account. Providing users with information regarding the number of unsuccessful attempts made to login to their account allows the user to determine if any unauthorized activity has occurred and gives them an opportunity to notify administrators. Permanent finding - Auditing cannot be configured/implemented like a typical UNIX system. Auditing is turned on by default, as is logging. Syslog is the best way to ensure all access is logged. Access is limited to privileged roles only. In lockdown mode (required), only the vpxuser proxy has access.
STIG Date
VMware ESXi v5 Security Technical Implementation Guide 2013-01-15

Details

Check Text ( C-SRG-OS-000234-ESXI5-PF_chk )
ESXi does not support this requirement. This is a permanent finding.
Fix Text (F-SRG-OS-000234-ESXI5-PF_fix)
This requirement is a permanent finding and cannot be fixed. An appropriate mitigation for the system must be implemented but this finding cannot be considered fixed.