Skip to main content
  1. posts/

Identity Is the Real Attack Surface

 Author
Author
Christian Mohn
IT veteran, podcaster, author, and blogger from Bergen, Norway.
Table of Contents
VCF Security Reality Check: ESX, vCenter & Identity - This article is part of a series.
Part 4: This Article
Why identity determines whether ESX and vCenter are reachable at all.

If ESX is where execution happens, and vCenter is where control is concentrated, then identity is what determines whether either of them is reachable in the first place.

Not in theory, and not in design documentation, but in how environments behave once they are running at scale.

Most discussions about ESX and vCenter security start too low in the stack. They focus on hardening hosts, isolating networks, or restricting management interfaces. All of that assumes a stable boundary around the systems themselves.

In practice, that boundary is already decided before any of those controls matter.

Where access actually begins
#

In real environments, access rarely starts with infrastructure compromise.

It starts with identity that already works. Compromises in these environments are rarely advanced in a technical sense.

They are usually simple, repeatable, and built on known weak points: identity systems, password reset flows, helpdesk processes, federation trust, and management interfaces that were never designed around hostile identity assumptions.

This is where public reporting on groups such as Scattered Spider becomes relevant. Their methodology reflects a broader and well-observed pattern in modern intrusions: systems are not broken, they are entered through trusted identity paths. The focus is social engineering and identity abuse rather than exploitation of infrastructure components.

The objective is not to break ESX or bypass vCenter controls. The objective is to become a trusted identity in the environment.

Once that condition is met, the infrastructure behaves exactly as designed.

A reused administrative account. A service principal that was never rotated. A legacy integration still trusted across systems. Credentials that remain valid long after the operational context that created them has disappeared. In most enterprise environments, identity is federated. Active Directory remains the dominant on-prem identity layer, while Entra ID increasingly fulfills that role in hybrid architectures.

These systems do not just authenticate users. They define what is reachable.

vCenter typically integrates with them through federation or SSO. ESX, however, still supports direct authentication paths that sit outside that federated identity model.

That difference is critical.

Once identity is valid, everything else becomes reachable through normal administrative interfaces. ESX does not need to be exploited. vCenter does not need to be bypassed. The systems behave exactly as designed.

MFA does not extend uniformly into the stack
#

A common misconception in virtualized environments is that identity controls apply consistently across all layers.

They do not.

vCenter can participate in federated identity systems and enforce multi-factor authentication through those flows. ESX does not operate in the same model.

Direct ESX access via SSH or local console remains fundamentally credential-based. Once valid credentials are presented, no additional identity verification is introduced at the host layer.

This creates a structural split:

  • vCenter: identity-federated control plane
  • ESX: direct authentication execution layer

The implication is simple. Once credentials are valid, ESX accepts them as authoritative. No additional identity decision is made.

The firewall assumption collapses under identity
#

A persistent assumption in infrastructure security is that segmentation defines safety boundaries.

That assumption only holds if identity is constrained.

Once identity is valid, segmentation no longer defines security boundaries in practice. It only defines connectivity paths. From the perspective of ESX and vCenter, there is no distinction between legitimate administration and compromise. Both appear as valid authenticated activity.

This aligns with observed attacker behavior described in MITRE ATT&CK, where credential-based access and legitimate authentication flows are primary mechanisms for lateral movement.

https://attack.mitre.org/

Identity defines the operating scope
#

Identity is the control input for the entire system. At the ESX layer, it determines whether access exists. At the vCenter layer, it determines what that access can influence. Neither system evaluates intent once authentication succeeds.

They execute within the scope identity provides. This is why identity compromise is difficult to detect at the infrastructure layer. Nothing appears abnormal from the system’s perspective.

Federated identity is what scales the model
#

The introduction of federated identity systems such as Active Directory and Entra ID is what transforms this from a single-system authentication problem into an infrastructure-wide control model.

Identity becomes portable across systems.

That means a single identity decision can affect ESX access, vCenter administration, backup systems, automation, and monitoring platforms simultaneously.

Research consistently highlights the risk introduced by identity federation in virtualized environments, particularly where trust relationships extend across systems that were not originally designed for shared authentication boundaries.

The key point is not that federation is incorrect.

It is that it creates shared trust across systems that assume isolation.

Why segmentation fails as a standalone control
#

Network segmentation assumes systems are isolated unless explicitly connected. Identity removes that assumption.

Once authentication is valid, segmentation no longer limits system behavior in practice. It only determines how systems are reached, not what they will accept. ost environments arrive at this state gradually, through accumulated access decisions rather than deliberate design.

Federated identity accelerates this convergence because portability of access is a design goal, not an exception.

VCF and consistent propagation of trust
#

In VMware Cloud Foundation environments, identity mapping and role definitions are applied consistently across components. That consistency ensures predictable behavior, but it also ensures that identity decisions are propagated uniformly.

A misconfigured role is not localized. It is applied across all systems within the domain of control.

VCF does not introduce this dependency. It standardizes it.

The dependency chain (linking Post 1 and Post 2)
#

Post 1 described ESX as a high-value execution target.

Post 2 described vCenter as the control concentration point.

Both depend on a single condition: identity being valid.

Identity is therefore not an upstream system. It is the condition that determines whether ESX and vCenter are reachable at all. Once identity is compromised, ESX and vCenter are no longer separate concerns. They are part of a single operational chain.

Closing thought
#

Most environments do not fail at the hypervisor layer or the control layer. They fail earlier, at the point where identity is assumed to be safe because it already works. ESX enforces execution. vCenter defines control. Identity defines whether either of them becomes relevant.

That is what makes it the real attack surface. Not because it is visible, but because everything else depends on it behaving correctly.

VCF Security Reality Check: ESX, vCenter & Identity - This article is part of a series.
Part 4: This Article

Related