Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-39424 | GEN002260-ESXI5-000047 | SV-51282r3_rule | Low |
Description |
---|
If an unauthorized device is allowed to exist on the system, there is the possibility the system may perform unauthorized operations. |
STIG | Date |
---|---|
VMware ESXi Server 5.0 Security Technical Implementation Guide | 2016-02-10 |
Check Text ( C-46698r3_chk ) |
---|
Ask the SA if the system is checked for extraneous device files on a weekly basis. To manually perform the check, disable lock down mode, enable the ESXi Shell, and execute the following command: # find / \( -type b -o -type c \) -exec ls -lL {} \; Re-enable lock down mode. If no automated or manual process is in place, this is a finding. |
Fix Text (F-44437r2_fix) |
---|
Configure the system to check for extraneous device files on a weekly basis. Refer to the Check Content section above for the basic command structure to search the file system. Additionally, ensure persistence of the command output by storing results to a target located on persistent storage. |