Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-207615 | ESXI-65-000014 | SV-207615r388482_rule | Low |
Description |
---|
Permitting direct root login reduces auditable information about who ran privileged commands on the system and also allows direct attack attempts on root's password. |
STIG | Date |
---|---|
VMware vSphere 6.5 ESXi Security Technical Implementation Guide | 2020-12-31 |
Check Text ( C-7870r364244_chk ) |
---|
From an SSH session connected to the ESXi host, or from the ESXi shell, run the following command: # grep -i "^PermitRootLogin" /etc/ssh/sshd_config If there is no output or the output is not exactly "PermitRootLogin no", this is a finding. |
Fix Text (F-7870r364245_fix) |
---|
From an SSH session connected to the ESXi host, or from the ESXi shell, add or correct the following line in "/etc/ssh/sshd_config": Add or correct the following line in "/etc/ssh/sshd_config": PermitRootLogin no |