VMCH-06-000001 - The system must explicitly disable copy operations.

Details

Copy and paste operations are disabled by default; however, by explicitly disabling this feature it will enable audit controls to check that this setting is correct. Copy, paste, drag and drop, or GUI copy/paste operations between the guest OS and the remote console could provide the means for an attacker to compromise the VM.


Solution

From the vSphere Client select the Virtual Machine right click and go to Edit Settings >> VM Options Tab >> Advanced >> Configuration Parameters.

Find the isolation.tools.copy.disable value and set it to true. If the setting does not exist click 'Add Row' to add the setting to the virtual machine.

Note: The VM must be powered off to configure the advanced settings through the vSphere Client so it is recommended to configure these settings with PowerCLI as it can be done while the VM is powered on.

or

From a PowerCLI command prompt while connected to the ESXi host or vCenter server run the following command:

If the setting does not exist run:

Get-VM 'VM Name' | New-AdvancedSetting -Name isolation.tools.copy.disable -Value true

If the setting exists run:

Get-VM 'VM Name' | Get-AdvancedSetting -Name isolation.tools.copy.disable | Set-AdvancedSetting -Value true


Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Configuration Management.This control applies to the following type of system VMware.


References


Source