VMware Automation 7.x Application Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +8 −7
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 8
- V-239845 High vRA must enable FIPS Mode.
- V-239846 Medium The vRealize Automation application must be configured to a 15 minute of less session timeout.
- V-239847 Medium The vRealize Automation server must be configured to perform complete application deployments.
- V-239848 Medium The vRealize Automation security file must be restricted to the vcac user.
- V-239849 Medium The application server must only allow the use of DoD PKI-established certificate authorities for verification of the establishment of protected sessions.
- V-239850 Medium The application server must use DoD- or CNSS-approved PKI Class 3 or Class 4 certificates.
- V-239851 Medium The vRealize Automation appliance must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
- V-258450 High The version of vRealize Automation application running on the system must be a supported version.
Removed rules 7
- V-89125 High vRA must enable FIPS Mode.
- V-89127 Medium The vRealize Automation application must be configured to a 15 minute of less session timeout.
- V-89129 Medium The vRealize Automation server must be configured to perform complete application deployments.
- V-89131 Medium The vRealize Automation security file must be restricted to the vcac user.
- V-89133 Medium The application server must only allow the use of DoD PKI-established certificate authorities for verification of the establishment of protected sessions.
- V-89135 Medium The application server must use DoD- or CNSS-approved PKI Class 3 or Class 4 certificates.
- V-89137 Medium The vRealize Automation appliance must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
- RMF Control
- IA-7
- Severity
- H
- CCI
- CCI-000803
- Version
- VRAU-AP-000265
- Vuln IDs
-
- V-239845
- V-89125
- Rule IDs
-
- SV-239845r879616_rule
- SV-99775
Checks: C-43078r664449_chk
Check that FIPS mode is enabled in the vRealize Automation virtual appliance management interface with the following steps: 1. Log on to the vRealize Automation virtual appliance management interface (vAMI): https://vrealize-automation-appliance-FQDN:5480 2. Select vRA Settings >> Host Settings. 3. Review the button under the Actions heading on the upper right to confirm that "enable FIPS" is selected. If "enable FIPS" is not selected, this is a finding. Alternately, check that FIPS mode is enabled in the command line using the following steps: 1. Log on to the console as root. 2. Run the command: vcac-vami fips status If FIPS is not enabled, this is a finding.
Fix: F-43037r664450_fix
FIPS mode in the vRealize Automation virtual appliance management interface can be enabled with the following steps: 1. Log on to the vRealize Automation virtual appliance management interface (vAMI): https://vrealize-automation-appliance-FQDN:5480 2. Select vRA Settings >> Host Settings. 3. Click the button under the "Actions" heading on the upper right to enable or disable FIPS. 4. Click "Yes" to restart the vRealize Automation appliance. Alternately, FIPS mode can be enabled in the command line using the following steps: 1. Log on to the console as root. 2. Run the command: vcac-vami fips enable
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001185
- Version
- VRAU-AP-000295
- Vuln IDs
-
- V-239846
- V-89127
- Rule IDs
-
- SV-239846r879637_rule
- SV-99777
Checks: C-43079r664452_chk
Verify that the session timeout is set to an organization-defined time with the following steps: 1. Log on to the admin UI as the administrator. 2. Navigate to "Global Settings". 3. Review the session timeout value in minutes. If the session timeout setting is not set to 15 minutes or less, this is a finding.
Fix: F-43038r664453_fix
To edit the session timeout, use the following steps: 1. Log on to the admin UI as the administrator. 2. Navigate to "Global Settings". 3. Select "Edit Global Settings", edit the "Session Timeout:" setting, and then select "OK".
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- VRAU-AP-000315
- Vuln IDs
-
- V-239847
- V-89129
- Rule IDs
-
- SV-239847r879640_rule
- SV-99779
Checks: C-43080r664455_chk
Obtain the site configuration control policy from the ISSO. Review site procedures to determine if a site policy exists to verify vRA installation after release into a production environment. The site policy should ensure that the installation was a complete application deployment before users are allowed to conduct business. If a site policy does not exist or is not being followed, this is a finding.
Fix: F-43039r664456_fix
Develop a site policy to ensure deployments are completed before allowing users to use the production environment.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- VRAU-AP-000400
- Vuln IDs
-
- V-239848
- V-89131
- Rule IDs
-
- SV-239848r879717_rule
- SV-99781
Checks: C-43081r664458_chk
At the command prompt, execute the following command: ls -l /etc/vcac/security.properties If the file owner and group-owner are not "vcac", this is a finding.
Fix: F-43040r664459_fix
At the command prompt, execute the following commands: chown vcac:vcac /etc/vcac/security.properties
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-002470
- Version
- VRAU-AP-000540
- Vuln IDs
-
- V-239849
- V-89133
- Rule IDs
-
- SV-239849r879798_rule
- SV-99783
Checks: C-43082r664461_chk
Verify that Smart Card Authentication is in use with the following steps: 1. In vRA, go to Administration >> Directories Management >> Identity Providers. 2. Verify that the identity provider listed is the identity provider used for smart card authentication. 3. In vRA, go to Administration >> Directories Management >> Policies. 4. Verify that the default policy authentication method is set to "certificate". If the identity provider listed is not that used for smart card authentication, this is a finding. If the default policy authentication method is not set to "certificate", this is a finding.
Fix: F-43041r664462_fix
Configure vRA to use Smart Card Authentication with the following steps: 1. Set up smart card infrastructure as per VMware documentation, if required. 2. In vRA, go to Administration >> Directories Management >> Identity Providers. 3. Add the identity provider used for smart card authentication. 4. In vRA, go to Administration >> Directories Management >> Policies. 5. Edit default policy and change authentication method to "certificate".
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- VRAU-AP-000645
- Vuln IDs
-
- V-239850
- V-89135
- Rule IDs
-
- SV-239850r879885_rule
- SV-99785
Checks: C-43083r664464_chk
Verify that Smart Card Authentication is in use with the following steps: 1. In vRA, go to Administration >> Directories Management >> Identity Providers. 2. Verify that the identity provider listed is the identity provider used for smart card authentication. 3. In vRA, go to Administration >> Directories Management >> Policies. 4. Verify that the default policy authentication method is set to "certificate". If the identity provider listed is not that used for smart card authentication, this is a finding. If the default policy authentication method is not set to "certificate", this is a finding.
Fix: F-43042r664465_fix
Configure vRA to use Smart Card Authentication with the following steps: 1. Set up smart card infrastructure as per VMware documentation, if required. 2. In vRA, go to Administration >> Directories Management >> Identity Providers. 3. Add the identity provider used for smart card authentication. 4. In vRA, go to Administration >> Directories Management >> Policies. 5. Edit default policy and change authentication method to "certificate".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- VRAU-AP-000655
- Vuln IDs
-
- V-239851
- V-89137
- Rule IDs
-
- SV-239851r879887_rule
- SV-99787
Checks: C-43084r664467_chk
Obtain the current vRealize Automation STIGs from the ISSO. Verify that this STIG is the most current STIG available for vRealize Automation. Assess all of the organization's vRA installations to ensure they are fully compliant with the most current STIG. If the most current version of the vRA STIG was not used, or if the vRA appliance configuration is not compliant with the most current STIG, this is a finding.
Fix: F-43043r664468_fix
Obtain the most current vRealize Automation STIG. Verify that this vRA appliance is configured with all current requirements.
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- VRAU-AP-009999
- Vuln IDs
-
- V-258450
- Rule IDs
-
- SV-258450r928879_rule
Checks: C-62190r928878_chk
vRealize Automation 7.x Application is no longer supported by the vendor. If the system is running vRealize Automation 7.x Application, this is a finding.
Fix: F-53958r798705_fix
Upgrade to a supported version.