[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

admin role in vcenter

Posted on 2013-11-12
3
Medium Priority
?
369 Views
Last Modified: 2013-11-12
can anyone provide some examples of the kind of issue/risk if an unauthorised user gained access to vcenter with an account with the admin role permissions. I am trying to gauge the potential risk if this ever happened.
0
Comment
Question by:pma111
  • 2
3 Comments
 
LVL 124

Accepted Solution

by:
Andrew Hancock (VMware vExpert / EE MVE^2) earned 2000 total points
ID: 39641044
1. Stop Virtual Machines
2. Delete Virtual Machines
3. Remove ESXi Hosts from vCenter Server.
4. Shutdown ESXi Hosts
5. Reboot ESXi Hosts
6. Potentially Access Console or Hosts
7. Potentially obtain files from VMs
8. Many Risks.....
0
 
LVL 3

Author Comment

by:pma111
ID: 39641047
Any risks from a data security standpoint, i.e. a virtual file server with sensitive payroll xls - can they access that from there?
0
 
LVL 124
ID: 39641185
Yes, an Admin could do the following:-

1. Power off VM.
2. Copy the Virtual Machine Disk to local laptop.
3. Mount the virtual machine disk (VMDK) as a drive letter, overcoming ANY OS Active Directory or Unix Login.
4. Inspect the data.

Easy!

if you wanted to do this secretly, without turning off the VM.

1. Clone the VM, whilst the VM was on.
2. Copy the Virtual Machine CLONE Disk to local laptop.
3. Delete the CLONE VM.
4. 3. Mount the virtual machine disk (VMDK) as a drive letter, overcoming ANY OS Active Directory or Unix Login.
4. Inspect the data.

Easy!

Virtualisation Administrators have more POWER, than your usual Domain Administrators!

Domain Administrators are responsible for Microsoft Active Directory Management (e.g  Domain, usernames and accounts, passwords , group policy).

Virtualisation Administrators are not often Domain Administrators, but they can be!
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article we will learn how to backup a VMware farm using Nakivo Backup & Replication. In this tutorial we will install the software on a Windows 2012 R2 Server.
What if you have to shut down the entire Citrix infrastructure for hardware maintenance, software upgrades or "the unknown"? I developed this plan for "the unknown" and hope that it helps you as well. This article explains how to properly shut down …
Teach the user how to install and configure the vCenter Orchestrator virtual appliance Open vSphere Web Client: Deploy vCenter Orchestrator virtual appliance OVA file: Verify vCenter Orchestrator virtual appliance boots successfully: Connect to the …
This course is ideal for IT System Administrators working with VMware vSphere and its associated products in their company infrastructure. This course teaches you how to install and maintain this virtualization technology to store data, prevent vuln…
Suggested Courses

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question