VMware vRealize Automation 7.x tc Server Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +155 −161
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 155
- V-240725 Medium tc Server HORIZON must limit the number of maximum concurrent connections permitted.
- V-240726 Medium tc Server VCO must limit the number of maximum concurrent connections permitted.
- V-240727 Medium tc Server VCAC must limit the number of maximum concurrent connections permitted.
- V-240728 Medium tc Server HORIZON must limit the amount of time that each TCP connection is kept alive.
- V-240729 Medium tc Server VCO must limit the amount of time that each TCP connection is kept alive.
- V-240730 Medium tc Server VCAC must limit the amount of time that each TCP connection is kept alive.
- V-240731 Medium tc Server HORIZON must limit the number of times that each TCP connection is kept alive.
- V-240732 Medium tc Server VCO must limit the number of times that each TCP connection is kept alive.
- V-240733 Medium tc Server VCAC must limit the number of times that each TCP connection is kept alive.
- V-240734 Medium tc Server HORIZON must perform server-side session management.
- V-240735 Medium tc Server VCO must perform server-side session management.
- V-240736 Medium tc Server VCAC must perform server-side session management.
- V-240737 Medium tc Server HORIZON must be configured with FIPS 140-2 compliant ciphers for HTTPS connections.
- V-240738 Medium tc Server VCAC must be configured with FIPS 140-2 compliant ciphers for HTTPS connections.
- V-240739 Medium tc Server HORIZON must use cryptography to protect the integrity of remote sessions.
- V-240740 Medium tc Server VCAC must use cryptography to protect the integrity of remote sessions.
- V-240741 Medium tc Server HORIZON must record user access in a format that enables monitoring of remote access.
- V-240742 Medium tc Server VCO must record user access in a format that enables monitoring of remote access.
- V-240743 Medium tc Server VCAC must record user access in a format that enables monitoring of remote access.
- V-240744 Medium tc Server ALL must generate log records for system startup and shutdown.
- V-240745 Medium tc Server HORIZON must generate log records for user access and authentication events.
- V-240746 Medium tc Server VCO must generate log records for user access and authentication events.
- V-240747 Medium tc Server VCAC must generate log records for user access and authentication events.
- V-240748 Medium tc Server ALL must initiate logging during service start-up.
- V-240749 Medium tc Server HORIZON must produce log records containing sufficient information to establish what type of events occurred.
- V-240750 Medium tc Server VCO must produce log records containing sufficient information to establish what type of events occurred.
- V-240751 Medium tc Server VCAC must produce log records containing sufficient information to establish what type of events occurred.
- V-240752 Medium tc Server HORIZON must produce log records containing sufficient information to establish when (date and time) events occurred.
- V-240753 Medium tc Server VCO must produce log records containing sufficient information to establish when (date and time) events occurred.
- V-240754 Medium tc Server VCAC must produce log records containing sufficient information to establish when (date and time) events occurred.
- V-240755 Medium tc Server HORIZON must produce log records containing sufficient information to establish where within the web server the events occurred.
- V-240756 Medium tc Server VCO must produce log records containing sufficient information to establish where within the web server the events occurred.
- V-240757 Medium tc Server VCAC must produce log records containing sufficient information to establish where within the web server the events occurred.
- V-240758 Medium tc Server HORIZON must produce log records containing sufficient information to establish the source of events.
- V-240759 Medium tc Server VCO must produce log records containing sufficient information to establish the source of events.
- V-240760 Medium tc Server VCAC must produce log records containing sufficient information to establish the source of events.
- V-240761 Medium tc Server HORIZON must be configured with the RemoteIpValve in order to produce log records containing the client IP information as the source and destination and not the load balancer or proxy IP information with each event.
- V-240762 Medium tc Server VCO must be configured with the RemoteIpValve in order to produce log records containing the client IP information as the source and destination and not the load balancer or proxy IP information with each event.
- V-240763 Medium tc Server VCAC must be configured with the RemoteIpValve in order to produce log records containing the client IP information as the source and destination and not the load balancer or proxy IP information with each event.
- V-240764 Medium tc Server HORIZON must produce log records that contain sufficient information to establish the outcome (success or failure) of events.
- V-240765 Medium tc Server VCO must produce log records that contain sufficient information to establish the outcome (success or failure) of events.
- V-240766 Medium tc Server VCAC must produce log records that contain sufficient information to establish the outcome (success or failure) of events.
- V-240767 Medium tc Server HORIZON must produce log records containing sufficient information to establish the identity of any user/subject or process associated with an event.
- V-240768 Medium tc Server VCO must produce log records containing sufficient information to establish the identity of any user/subject or process associated with an event.
- V-240769 Medium tc Server VCAC must produce log records containing sufficient information to establish the identity of any user/subject or process associated with an event.
- V-240770 Medium tc Server ALL must use a logging mechanism that is configured to alert the ISSO and SA in the event of a processing failure.
- V-240771 Medium tc Server HORIZON log files must only be accessible by privileged users.
- V-240772 Medium tc Server VCO log files must only be accessible by privileged users.
- V-240773 Medium tc Server VCAC log files must only be accessible by privileged users.
- V-240774 Medium tc Server HORIZON log files must be protected from unauthorized modification.
- V-240775 Medium tc Server VCO log files must be protected from unauthorized modification.
- V-240776 Medium tc Server VCAC log files must be protected from unauthorized modification.
- V-240777 Medium tc Server HORIZON log files must be protected from unauthorized deletion.
- V-240778 Medium tc Server VCO log files must be protected from unauthorized deletion.
- V-240779 Medium tc Server VCAC log files must be protected from unauthorized deletion.
- V-240780 Medium tc Server ALL log data and records must be backed up onto a different system or media.
- V-240781 Medium tc Server ALL server files must be verified for their integrity (e.g., checksums and hashes) before becoming part of the production web server.
- V-240782 Medium tc Server ALL expansion modules must be fully reviewed, tested, and signed before they can exist on a production web server.
- V-240783 Medium tc Server HORIZON must not use the tomcat-users XML database for user management.
- V-240784 Medium tc Server VCO must not use the tomcat-users XML database for user management.
- V-240785 Medium tc Server VCAC must not use the tomcat-users XML database for user management.
- V-240786 Medium tc Server ALL must only contain services and functions necessary for operation.
- V-240787 High tc Server ALL must exclude documentation, sample code, example applications, and tutorials.
- V-240788 Medium tc Server ALL must exclude installation of utility programs, services, plug-ins, and modules not necessary for operation.
- V-240789 Medium tc Server ALL must have Multipurpose Internet Mail Extensions (MIME) that invoke OS shell programs disabled.
- V-240790 Medium tc Server ALL must have all mappings to unused and vulnerable scripts to be removed.
- V-240791 Medium tc Server HORIZON must have mappings set for Java Servlet Pages.
- V-240792 Medium tc Server VCO must have mappings set for Java Servlet Pages.
- V-240793 Medium tc Server VCAC must have mappings set for Java Servlet Pages.
- V-240794 Medium tc Server ALL must not have the Web Distributed Authoring (WebDAV) servlet installed.
- V-240795 Medium tc Server HORIZON must be configured with memory leak protection.
- V-240796 Medium tc Server VCO must be configured with memory leak protection.
- V-240797 Medium tc Server VCAC must be configured with memory leak protection.
- V-240798 Medium tc Server VCO must not have any symbolic links in the web content directory tree.
- V-240799 Medium tc Server HORIZON must be configured to use a specified IP address and port.
- V-240800 Medium tc Server VCO must be configured to use a specified IP address and port.
- V-240801 Medium tc Server VCAC must be configured to use a specified IP address and port.
- V-240802 Medium tc Server HORIZON must encrypt passwords during transmission.
- V-240803 Medium tc Server VCAC must encrypt passwords during transmission.
- V-240804 Medium tc Server ALL must validate client certificates, to include all intermediary CAs, to ensure the client-presented certificates are valid and that the entire trust chain is valid.
- V-240805 Medium tc Server ALL must only allow authenticated system administrators to have access to the keystore.
- V-240806 Medium tc Server HORIZON must use cryptographic modules that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance when authenticating users and processes.
- V-240807 Medium tc Server VCAC must use cryptographic modules that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance when authenticating users and processes.
- V-240808 High tc Server HORIZON accounts accessing the directory tree, the shell, or other operating system functions and utilities must be administrative accounts.
- V-240809 High tc Server VCO accounts accessing the directory tree, the shell, or other operating system functions and utilities must be administrative accounts.
- V-240810 High tc Server VCAC accounts accessing the directory tree, the shell, or other operating system functions and utilities must be administrative accounts.
- V-240811 High tc Server HORIZON web server application directories must not be accessible to anonymous user.
- V-240812 High tc Server VCO web server application directories must not be accessible to anonymous user.
- V-240813 High tc Server VCAC web server application directories must not be accessible to anonymous user.
- V-240814 Medium tc Server ALL baseline must be documented and maintained.
- V-240815 Medium tc Server HORIZON must be built to fail to a known safe state if system initialization fails, shutdown fails, or aborts fail.
- V-240816 Medium tc Server VCO must be built to fail to a known safe state if system initialization fails, shutdown fails, or aborts fail.
- V-240817 Medium tc Server VCAC must be built to fail to a known safe state if system initialization fails, shutdown fails, or aborts fail.
- V-240818 Medium tc Server HORIZON document directory must be in a separate partition from the web servers system files.
- V-240819 Medium tc Server VCO document directory must be in a separate partition from the web servers system files.
- V-240820 Medium tc Server VCAC document directory must be in a separate partition from the web servers system files.
- V-240824 Medium tc Server HORIZON must set URIEncoding to UTF-8.
- V-240825 Medium tc Server VCO must set URIEncoding to UTF-8.
- V-240826 Medium tc Server HORIZON must use the setCharacterEncodingFilter filter.
- V-240827 Medium tc Server VCO must use the setCharacterEncodingFilter filter.
- V-240828 Medium tc Server VCAC must set URIEncoding to UTF-8.
- V-240829 Medium tc Server VCAC must use the setCharacterEncodingFilter filter.
- V-240830 Medium tc Server HORIZON must set the welcome-file node to a default web page.
- V-240831 Medium tc Server VCO must set the welcome-file node to a default web page.
- V-240832 Medium tc Server VCAC must set the welcome-file node to a default web page.
- V-240833 Medium tc Server HORIZON must have the allowTrace parameter set to false.
- V-240834 Medium tc Server VCO must have the allowTrace parameter set to false.
- V-240835 Medium tc Server VCAC must have the allowTrace parameter set to false.
- V-240836 Medium tc Server HORIZON must have the debug option turned off.
- V-240837 Medium tc Server VCO must have the debug option turned off.
- V-240838 Medium tc Server VCAC must have the debug option turned off.
- V-240839 Medium tc Server HORIZON must set an inactive timeout for sessions.
- V-240840 Medium tc Server VCO must set an inactive timeout for sessions.
- V-240841 Medium tc Server VCAC must set an inactive timeout for sessions.
- V-240842 High tc Server ALL must be configured to the correct user authentication source.
- V-240843 Medium tc Server HORIZON must be configured to use the https scheme.
- V-240844 Medium tc Server VCAC must be configured to use the https scheme.
- V-240845 Medium tc Server ALL must use a logging mechanism that is configured to allocate log record storage capacity large enough to accommodate the logging requirements of the web server.
- V-240846 Medium tc Server ALL log files must be moved to a permanent repository in accordance with site policy.
- V-240847 Medium tc Server ALL must use a logging mechanism that is configured to provide a warning to the ISSO and SA when allocated record storage volume reaches 75% of maximum log record storage capacity.
- V-240848 Medium tc Server HORIZON must generate log records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
- V-240849 Medium tc Server VCO must generate log records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
- V-240850 Medium tc Server VCAC must generate log records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
- V-240851 Medium tc Server HORIZON must record time stamps for log records to a minimum granularity of one second.
- V-240852 Medium tc Server VCO must record time stamps for log records to a minimum granularity of one second.
- V-240853 Medium tc Server VCAC must record time stamps for log records to a minimum granularity of one second.
- V-240854 Medium tc Server HORIZON application, libraries, and configuration files must only be accessible to privileged users.
- V-240855 Medium tc Server VCO application, libraries, and configuration files must only be accessible to privileged users.
- V-240856 Medium tc Server VCAC application, libraries, and configuration files must only be accessible to privileged users.
- V-240857 Medium tc Server HORIZON must be configured with the appropriate ports.
- V-240858 Medium tc Server VCO must be configured with the appropriate ports.
- V-240859 Medium tc Server VCAC must be configured with the appropriate ports.
- V-240860 Medium tc Server HORIZON must use NSA Suite A cryptography when encrypting data that must be compartmentalized.
- V-240861 Medium tc Server VCAC must use NSA Suite A cryptography when encrypting data that must be compartmentalized.
- V-240862 Medium tc Server HORIZON must disable the shutdown port.
- V-240863 Medium tc Server VCO must disable the shutdown port.
- V-240864 Medium tc Server VCAC must disable the shutdown port.
- V-240865 Medium tc Server HORIZON must employ cryptographic mechanisms (TLS/DTLS/SSL) preventing the unauthorized disclosure of information during transmission.
- V-240866 Medium tc Server VCAC must employ cryptographic mechanisms (TLS/DTLS/SSL) preventing the unauthorized disclosure of information during transmission.
- V-240867 Medium tc Server HORIZON session IDs must be sent to the client using SSL/TLS.
- V-240868 Medium tc Server VCAC session IDs must be sent to the client using SSL/TLS.
- V-240869 Medium tc Server HORIZON must set the useHttpOnly parameter.
- V-240870 Medium tc Server VCO must set the useHttpOnly parameter.
- V-240871 Medium tc Server VCAC must set the useHttpOnly parameter.
- V-240872 Medium tc Server HORIZON must set the secure flag for cookies.
- V-240873 Medium tc Server VCO must set the secure flag for cookies.
- V-240874 Medium tc Server VCAC must set the secure flag for cookies.
- V-240875 High tc Server HORIZON must set sslEnabledProtocols to an approved Transport Layer Security (TLS) version.
- V-240876 High tc Server VCAC must set sslEnabledProtocols to an approved Transport Layer Security (TLS) version.
- V-240877 Medium tc Server HORIZON must remove all export ciphers to protect the confidentiality and integrity of transmitted information.
- V-240878 Medium tc Server VCAC must remove all export ciphers to protect the confidentiality and integrity of transmitted information.
- V-240879 Medium tc Server HORIZON must use approved Transport Layer Security (TLS) versions to maintain the confidentiality and integrity of information during reception.
- V-240880 Medium tc Server VCAC must use approved Transport Layer Security (TLS) versions to maintain the confidentiality and integrity of information during reception.
- V-240881 Medium tc Server ALL must have all security-relevant software updates installed within the configured time period directed by an authoritative source.
- V-240882 Medium tc Server ALL must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
Removed rules 161
- V-89883 Medium tc Server VCO must limit the number of maximum concurrent connections permitted.
- V-89885 Medium tc Server VCAC must limit the number of maximum concurrent connections permitted.
- V-89887 Medium tc Server HORIZON must limit the amount of time that each TCP connection is kept alive.
- V-89889 Medium tc Server VCO must limit the amount of time that each TCP connection is kept alive.
- V-89891 Medium tc Server VCAC must limit the amount of time that each TCP connection is kept alive.
- V-89893 Medium tc Server HORIZON must limit the number of times that each TCP connection is kept alive.
- V-89895 Medium tc Server VCO must limit the number of times that each TCP connection is kept alive.
- V-89897 Medium tc Server VCAC must limit the number of times that each TCP connection is kept alive.
- V-89899 Medium tc Server HORIZON must perform server-side session management.
- V-89901 Medium tc Server VCO must perform server-side session management.
- V-89903 Medium tc Server VCAC must perform server-side session management.
- V-89905 Medium tc Server HORIZON must be configured with FIPS 140-2 compliant ciphers for HTTPS connections.
- V-89907 Medium tc Server VCAC must be configured with FIPS 140-2 compliant ciphers for HTTPS connections.
- V-89909 Medium tc Server HORIZON must use cryptography to protect the integrity of remote sessions.
- V-89911 Medium tc Server HORIZON must record user access in a format that enables monitoring of remote access.
- V-89913 Medium tc Server VCO must record user access in a format that enables monitoring of remote access.
- V-89915 Medium tc Server VCAC must record user access in a format that enables monitoring of remote access.
- V-89917 Medium tc Server ALL must generate log records for system startup and shutdown.
- V-89919 Medium tc Server HORIZON must generate log records for user access and authentication events.
- V-89921 Medium tc Server VCO must generate log records for user access and authentication events.
- V-89923 Medium tc Server VCAC must generate log records for user access and authentication events.
- V-89925 Medium tc Server ALL must initiate logging during service start-up.
- V-89927 Medium tc Server HORIZON must capture, record, and log all content related to a user session.
- V-89929 Medium tc Server VCO must capture, record, and log all content related to a user session.
- V-89931 Medium tc Server VCAC must capture, record, and log all content related to a user session.
- V-89933 Medium tc Server HORIZON must produce log records containing sufficient information to establish what type of events occurred.
- V-89935 Medium tc Server VCO must produce log records containing sufficient information to establish what type of events occurred.
- V-89937 Medium tc Server VCAC must produce log records containing sufficient information to establish what type of events occurred.
- V-89939 Medium tc Server HORIZON must produce log records containing sufficient information to establish when (date and time) events occurred.
- V-89941 Medium tc Server VCO must produce log records containing sufficient information to establish when (date and time) events occurred.
- V-89943 Medium tc Server VCAC must produce log records containing sufficient information to establish when (date and time) events occurred.
- V-89945 Medium tc Server HORIZON must produce log records containing sufficient information to establish where within the web server the events occurred.
- V-89947 Medium tc Server VCO must produce log records containing sufficient information to establish where within the web server the events occurred.
- V-89949 Medium tc Server VCAC must produce log records containing sufficient information to establish where within the web server the events occurred.
- V-89951 Medium tc Server HORIZON must produce log records containing sufficient information to establish the source of events.
- V-89953 Medium tc Server VCO must produce log records containing sufficient information to establish the source of events.
- V-89955 Medium tc Server VCAC must produce log records containing sufficient information to establish the source of events.
- V-89957 Medium tc Server HORIZON must be configured with the RemoteIpValve in order to produce log records containing the client IP information as the source and destination and not the load balancer or proxy IP information with each event.
- V-89959 Medium tc Server VCO must be configured with the RemoteIpValve in order to produce log records containing the client IP information as the source and destination and not the load balancer or proxy IP information with each event.
- V-89961 Medium tc Server VCAC must be configured with the RemoteIpValve in order to produce log records containing the client IP information as the source and destination and not the load balancer or proxy IP information with each event.
- V-89963 Medium tc Server HORIZON must produce log records that contain sufficient information to establish the outcome (success or failure) of events.
- V-89965 Medium tc Server VCO must produce log records that contain sufficient information to establish the outcome (success or failure) of events.
- V-89967 Medium tc Server VCAC must produce log records that contain sufficient information to establish the outcome (success or failure) of events.
- V-89969 Medium tc Server HORIZON must produce log records containing sufficient information to establish the identity of any user/subject or process associated with an event.
- V-89971 Medium tc Server VCO must produce log records containing sufficient information to establish the identity of any user/subject or process associated with an event.
- V-89973 Medium tc Server VCAC must produce log records containing sufficient information to establish the identity of any user/subject or process associated with an event.
- V-89975 Medium tc Server ALL must use a logging mechanism that is configured to alert the ISSO and SA in the event of a processing failure.
- V-89977 Medium tc Server HORIZON log files must only be accessible by privileged users.
- V-89979 Medium tc Server VCO log files must only be accessible by privileged users.
- V-89981 Medium tc Server VCAC log files must only be accessible by privileged users.
- V-89983 Medium tc Server HORIZON log files must be protected from unauthorized modification.
- V-89985 Medium tc Server VCO log files must be protected from unauthorized modification.
- V-89987 Medium tc Server VCAC log files must be protected from unauthorized modification.
- V-89989 Medium tc Server HORIZON log files must be protected from unauthorized deletion.
- V-89991 Medium tc Server VCO log files must be protected from unauthorized deletion.
- V-89993 Medium tc Server VCAC log files must be protected from unauthorized deletion.
- V-89995 Medium tc Server ALL log data and records must be backed up onto a different system or media.
- V-89997 Medium tc Server ALL server files must be verified for their integrity (e.g., checksums and hashes) before becoming part of the production web server.
- V-89999 Medium tc Server ALL expansion modules must be fully reviewed, tested, and signed before they can exist on a production web server.
- V-90001 Medium tc Server HORIZON must not use the tomcat-users XML database for user management.
- V-90003 Medium tc Server VCO must not use the tomcat-users XML database for user management.
- V-90005 Medium tc Server VCAC must not use the tomcat-users XML database for user management.
- V-90007 Medium tc Server ALL must only contain services and functions necessary for operation.
- V-90009 High tc Server ALL must exclude documentation, sample code, example applications, and tutorials.
- V-90011 Medium tc Server ALL must have Multipurpose Internet Mail Extensions (MIME) that invoke OS shell programs disabled.
- V-90013 Medium tc Server ALL must have all mappings to unused and vulnerable scripts to be removed.
- V-90015 Medium tc Server HORIZON must have mappings set for Java Servlet Pages.
- V-90017 Medium tc Server VCO must have mappings set for Java Servlet Pages.
- V-90019 Medium tc Server VCAC must have mappings set for Java Servlet Pages.
- V-90021 Medium tc Server ALL must not have the Web Distributed Authoring (WebDAV) servlet installed.
- V-90023 Medium tc Server HORIZON must be configured with memory leak protection.
- V-90025 Medium tc Server VCO must be configured with memory leak protection.
- V-90027 Medium tc Server VCAC must be configured with memory leak protection.
- V-90029 Medium tc Server VCO must not have any symbolic links in the web content directory tree.
- V-90031 Medium tc Server HORIZON must be configured to use a specified IP address and port.
- V-90033 Medium tc Server VCO must be configured to use a specified IP address and port.
- V-90035 Medium tc Server VCAC must be configured to use a specified IP address and port.
- V-90037 Medium tc Server HORIZON must encrypt passwords during transmission.
- V-90039 Medium tc Server VCAC must encrypt passwords during transmission.
- V-90041 Medium tc Server ALL must validate client certificates, to include all intermediary CAs, to ensure the client-presented certificates are valid and that the entire trust chain is valid.
- V-90043 Medium tc Server HORIZON must use cryptographic modules that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance when authenticating users and processes.
- V-90045 Medium tc Server VCAC must use cryptographic modules that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance when authenticating users and processes.
- V-90047 High tc Server HORIZON accounts accessing the directory tree, the shell, or other operating system functions and utilities must be administrative accounts.
- V-90049 High tc Server VCO accounts accessing the directory tree, the shell, or other operating system functions and utilities must be administrative accounts.
- V-90051 High tc Server VCAC accounts accessing the directory tree, the shell, or other operating system functions and utilities must be administrative accounts.
- V-90053 High tc Server HORIZON web server application directories must not be accessible to anonymous user.
- V-90055 High tc Server VCO web server application directories must not be accessible to anonymous user.
- V-90057 High tc Server VCAC web server application directories must not be accessible to anonymous user.
- V-90059 Medium tc Server ALL baseline must be documented and maintained.
- V-90061 Medium tc Server HORIZON must be built to fail to a known safe state if system initialization fails, shutdown fails, or aborts fail.
- V-90063 Medium tc Server VCO must be built to fail to a known safe state if system initialization fails, shutdown fails, or aborts fail.
- V-90065 Medium tc Server VCAC must be built to fail to a known safe state if system initialization fails, shutdown fails, or aborts fail.
- V-90067 Medium tc Server HORIZON document directory must be in a separate partition from the web servers system files.
- V-90069 Medium tc Server VCO document directory must be in a separate partition from the web servers system files.
- V-90071 Medium tc Server VCAC document directory must be in a separate partition from the web servers system files.
- V-90073 Medium tc Server HORIZON must be configured with a cross-site scripting (XSS) filter.
- V-90075 Medium tc Server VCO must be configured with a cross-site scripting (XSS) filter.
- V-90077 Medium tc Server VCAC must be configured with a cross-site scripting (XSS) filter.
- V-90079 Medium tc Server HORIZON must set URIEncoding to UTF-8.
- V-90081 Medium tc Server VCO must set URIEncoding to UTF-8.
- V-90083 Medium tc Server HORIZON must use the setCharacterEncodingFilter filter.
- V-90085 Medium tc Server VCO must use the setCharacterEncodingFilter filter.
- V-90087 Medium tc Server VCAC must set URIEncoding to UTF-8.
- V-90089 Medium tc Server VCAC must use the setCharacterEncodingFilter filter.
- V-90091 Medium tc Server HORIZON must set the welcome-file node to a default web page.
- V-90093 Medium tc Server VCO must set the welcome-file node to a default web page.
- V-90095 Medium tc Server VCAC must set the welcome-file node to a default web page.
- V-90097 Medium tc Server HORIZON must have the allowTrace parameter set to false.
- V-90099 Medium tc Server VCO must have the allowTrace parameter set to false.
- V-90101 Medium tc Server VCAC must have the allowTrace parameter set to false.
- V-90103 Medium tc Server HORIZON must have the debug option turned off.
- V-90105 Medium tc Server VCO must have the debug option turned off.
- V-90107 Medium tc Server VCAC must have the debug option turned off.
- V-90109 Medium tc Server HORIZON must set an inactive timeout for sessions.
- V-90111 Medium tc Server VCO must set an inactive timeout for sessions.
- V-90113 Medium tc Server VCAC must set an inactive timeout for sessions.
- V-90115 High tc Server ALL must be configured to the correct user authentication source.
- V-90117 Medium tc Server HORIZON must be configured to use the https scheme.
- V-90119 Medium tc Server VCAC must be configured to use the https scheme.
- V-90121 Medium tc Server ALL must use a logging mechanism that is configured to allocate log record storage capacity large enough to accommodate the logging requirements of the web server.
- V-90123 Medium tc Server ALL must use a logging mechanism that is configured to provide a warning to the ISSO and SA when allocated record storage volume reaches 75% of maximum log record storage capacity.
- V-90125 Medium tc Server HORIZON must generate log records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
- V-90127 Medium tc Server VCO must generate log records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
- V-90129 Medium tc Server VCAC must generate log records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
- V-90131 Medium tc Server HORIZON must record time stamps for log records to a minimum granularity of one second.
- V-90133 Medium tc Server VCO must record time stamps for log records to a minimum granularity of one second.
- V-90135 Medium tc Server VCAC must record time stamps for log records to a minimum granularity of one second.
- V-90137 Medium tc Server HORIZON application, libraries, and configuration files must only be accessible to privileged users.
- V-90139 Medium tc Server VCO application, libraries, and configuration files must only be accessible to privileged users.
- V-90141 Medium tc Server VCAC application, libraries, and configuration files must only be accessible to privileged users.
- V-90143 Medium tc Server HORIZON must be configured with the appropriate ports.
- V-90145 Medium tc Server VCO must be configured with the appropriate ports.
- V-90147 Medium tc Server VCAC must be configured with the appropriate ports.
- V-90149 Medium tc Server HORIZON must use NSA Suite A cryptography when encrypting data that must be compartmentalized.
- V-90151 Medium tc Server VCAC must use NSA Suite A cryptography when encrypting data that must be compartmentalized.
- V-90153 Medium tc Server HORIZON must disable the shutdown port.
- V-90155 Medium tc Server VCO must disable the shutdown port.
- V-90157 Medium tc Server VCAC must disable the shutdown port.
- V-90159 Medium tc Server HORIZON must employ cryptographic mechanisms (TLS/DTLS/SSL) preventing the unauthorized disclosure of information during transmission.
- V-90161 Medium tc Server VCAC must employ cryptographic mechanisms (TLS/DTLS/SSL) preventing the unauthorized disclosure of information during transmission.
- V-90163 Medium tc Server HORIZON session IDs must be sent to the client using SSL/TLS.
- V-90165 Medium tc Server VCAC session IDs must be sent to the client using SSL/TLS.
- V-90167 Medium tc Server HORIZON must set the useHttpOnly parameter.
- V-90169 Medium tc Server VCO must set the useHttpOnly parameter.
- V-90171 Medium tc Server VCAC must set the useHttpOnly parameter.
- V-90173 Medium tc Server HORIZON must set the secure flag for cookies.
- V-90175 Medium tc Server VCO must set the secure flag for cookies.
- V-90177 Medium tc Server VCAC must set the secure flag for cookies.
- V-90179 High tc Server HORIZON must set sslEnabledProtocols to an approved Transport Layer Security (TLS) version.
- V-90181 High tc Server VCAC must set sslEnabledProtocols to an approved Transport Layer Security (TLS) version.
- V-90183 Medium tc Server HORIZON must remove all export ciphers to protect the confidentiality and integrity of transmitted information.
- V-90185 Medium tc Server VCAC must remove all export ciphers to protect the confidentiality and integrity of transmitted information.
- V-90187 Medium tc Server HORIZON must use approved Transport Layer Security (TLS) versions to maintain the confidentiality and integrity of information during reception.
- V-90189 Medium tc Server VCAC must use approved Transport Layer Security (TLS) versions to maintain the confidentiality and integrity of information during reception.
- V-90191 Medium tc Server ALL must have all security-relevant software updates installed within the configured time period directed by an authoritative source.
- V-90193 Medium tc Server ALL must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
- V-90341 Medium tc Server HORIZON must limit the number of maximum concurrent connections permitted.
- V-90343 Medium tc Server VCAC must use cryptography to protect the integrity of remote sessions.
- V-90345 Medium tc Server ALL must exclude installation of utility programs, services, plug-ins, and modules not necessary for operation.
- V-90347 Medium tc Server ALL must only allow authenticated system administrators to have access to the keystore.
- V-90349 Medium tc Server ALL log files must be moved to a permanent repository in accordance with site policy.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VRAU-TC-000005
- Vuln IDs
-
- V-240725
- V-90341
- Rule IDs
-
- SV-240725r673919_rule
- SV-100991
Checks: C-43958r673917_chk
At the command prompt, execute the following command: grep maxThreads /opt/vmware/horizon/workspace/conf/server.xml If the value of "maxThreads" is not "300" or is missing, this is a finding.
Fix: F-43917r673918_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to and locate <Executor>. Configure the <Executor> with the value 'maxThreads="300"'. Note: The <Executor> node should be configured per the following: <Executor maxThreads="300" minSpareThreads="50" name="tomcatThreadPool" namePrefix="tomcat-http--"/>
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VRAU-TC-000010
- Vuln IDs
-
- V-240726
- V-89883
- Rule IDs
-
- SV-240726r673922_rule
- SV-100533
Checks: C-43959r673920_chk
At the command prompt, execute the following command: grep maxThreads /etc/vco/app-server/server.xml If the value of "maxThreads" is not "300" or is missing, this is a finding.
Fix: F-43918r673921_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to and locate the <Connector> node. Configure the <Connector> with the value 'maxThreads="300"'.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VRAU-TC-000015
- Vuln IDs
-
- V-240727
- V-89885
- Rule IDs
-
- SV-240727r673925_rule
- SV-100535
Checks: C-43960r673923_chk
At the command prompt, execute the following command: grep maxThreads /etc/vcac/server.xml If the value of "maxThreads" is not "1000" or is missing, this is a finding.
Fix: F-43919r673924_fix
Navigate to and open /etc/vcac/server.xml. Navigate to and locate <Executor>. Configure the <Executor> with the value 'maxThreads="1000"'. Note: The <Executor> node should be configured per the following: <Executor maxThreads="1000" minSpareThreads="50" name="tomcatThreadPool" namePrefix="tomcat-http--"/>
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VRAU-TC-000020
- Vuln IDs
-
- V-240728
- V-89887
- Rule IDs
-
- SV-240728r673928_rule
- SV-100537
Checks: C-43961r673926_chk
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. If the value of "connectionTimeout" is not set to "20000" or is missing, this is a finding.
Fix: F-43920r673927_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. Configure each <Connector> node with the value 'connectionTimeout="20000"'.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VRAU-TC-000025
- Vuln IDs
-
- V-240729
- V-89889
- Rule IDs
-
- SV-240729r673931_rule
- SV-100539
Checks: C-43962r673929_chk
Navigate to and open /etc/vco/app-server/server.xml. Navigate to the <Connector> node. If the value of "connectionTimeout" is not set to "20000" or is missing, this is a finding.
Fix: F-43921r673930_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to the <Connector> node. Configure the <Connector> node with the value 'connectionTimeout="10000"'.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VRAU-TC-000030
- Vuln IDs
-
- V-240730
- V-89891
- Rule IDs
-
- SV-240730r673934_rule
- SV-100541
Checks: C-43963r673932_chk
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. If the value of "connectionTimeout" is not set to "10000" or is missing, this is a finding.
Fix: F-43922r673933_fix
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. Configure the <Connector> node with the value 'connectionTimeout="10000"'.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VRAU-TC-000035
- Vuln IDs
-
- V-240731
- V-89893
- Rule IDs
-
- SV-240731r673937_rule
- SV-100543
Checks: C-43964r673935_chk
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. If the value of "maxKeepAliveRequests" is not set to "15" or is missing, this is a finding.
Fix: F-43923r673936_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. Configure each <Connector> node with the value 'maxKeepAliveRequests="15"'.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VRAU-TC-000040
- Vuln IDs
-
- V-240732
- V-89895
- Rule IDs
-
- SV-240732r673940_rule
- SV-100545
Checks: C-43965r673938_chk
Navigate to and open /etc/vco/app-server/server.xml. Navigate to the <Connector> node. If the value of "maxKeepAliveRequests" is not set to "15" or is missing, this is a finding.
Fix: F-43924r673939_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to the <Connector> node. Configure the <Connector> node with the value 'maxKeepAliveRequests="15"'.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VRAU-TC-000045
- Vuln IDs
-
- V-240733
- V-89897
- Rule IDs
-
- SV-240733r673943_rule
- SV-100547
Checks: C-43966r673941_chk
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. If the value of "maxKeepAliveRequests" is not set to "15" or is missing, this is a finding.
Fix: F-43925r673942_fix
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. Configure the <Connector> node with the value 'maxKeepAliveRequests="15"'.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VRAU-TC-000050
- Vuln IDs
-
- V-240734
- V-89899
- Rule IDs
-
- SV-240734r673946_rule
- SV-100549
Checks: C-43967r673944_chk
At the command prompt, execute the following command: grep -E 'cookies=.false' /opt/vmware/horizon/workspace/conf/context.xml If the command produces any output, this is a finding.
Fix: F-43926r673945_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/context.xml. Navigate to and locate the <Context> node. Remove the value 'cookies="false"' from the <Context> node.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VRAU-TC-000055
- Vuln IDs
-
- V-240735
- V-89901
- Rule IDs
-
- SV-240735r673949_rule
- SV-100551
Checks: C-43968r673947_chk
At the command prompt, execute the following command: grep -E 'cookies=.false' /etc/vco/app-server/context.xml If the command produces any output, this is a finding.
Fix: F-43927r673948_fix
Navigate to and open /etc/vco/app-server/context.xml. Navigate to and locate the <Context> node. Remove the value 'cookies="false"' from the <Context> node.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VRAU-TC-000060
- Vuln IDs
-
- V-240736
- V-89903
- Rule IDs
-
- SV-240736r673952_rule
- SV-100553
Checks: C-43969r673950_chk
At the command prompt, execute the following command: grep -E 'cookies=.false' /etc/vcac/context.xml If the command produces any output, this is a finding.
Fix: F-43928r673951_fix
Navigate to and open /etc/vcac/context.xml. Navigate to and locate the <Context> node. Remove the value 'cookies="false"' from the <Context> node.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- VRAU-TC-000065
- Vuln IDs
-
- V-240737
- V-89905
- Rule IDs
-
- SV-240737r674392_rule
- SV-100555
Checks: C-43970r674391_chk
At the command prompt, execute the following command: grep bio-ssl.cipher.list /opt/vmware/horizon/workspace/conf/catalina.properties If the value of "bio-ssl.cipher.list" does not match the list of FIPS 140-2 ciphers or is missing, this is a finding. Note: To view a list of FIPS 140-2 ciphers, at the command prompt execute the following command: openssl ciphers 'FIPS'
Fix: F-43929r673954_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/catalina.properties. Navigate to and locate "bio-ssl.cipher.list". Configure the "bio-ssl.cipher.list" with FIPS 140-2 compliant ciphers.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- VRAU-TC-000070
- Vuln IDs
-
- V-240738
- V-89907
- Rule IDs
-
- SV-240738r674394_rule
- SV-100557
Checks: C-43971r674393_chk
At the command prompt, execute the following command: grep cipher /etc/vcac/catalina.properties If the value of "cipher" does not match the list of FIPS 140-2 ciphers or is missing, this is a finding. Note: To view a list of FIPS 140-2 ciphers, at the command prompt execute the following command: openssl ciphers 'FIPS'
Fix: F-43930r673957_fix
Navigate to and open /etc/vcac/catalina.properties. Navigate to and locate "cipher". Configure the "cipher" with FIPS 140-2 compliant ciphers.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- VRAU-TC-000075
- Vuln IDs
-
- V-240739
- V-89909
- Rule IDs
-
- SV-240739r673961_rule
- SV-100559
Checks: C-43972r673959_chk
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. If the value of "SSLEnabled" is not set to "true" or is missing, this is a finding.
Fix: F-43931r673960_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. Configure each <Connector> node with the value 'SSLEnabled="true"'.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- VRAU-TC-000080
- Vuln IDs
-
- V-240740
- V-90343
- Rule IDs
-
- SV-240740r673964_rule
- SV-100993
Checks: C-43973r673962_chk
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. If the value of "SSLEnabled" is not set to "true" or is missing, this is a finding.
Fix: F-43932r673963_fix
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. Configure the <Connector> node with the value 'SSLEnabled="true"'.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- VRAU-TC-000085
- Vuln IDs
-
- V-240741
- V-89911
- Rule IDs
-
- SV-240741r674396_rule
- SV-100561
Checks: C-43974r674395_chk
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to the <Host> node. Verify that the node contains a <Valve className="org.apache.catalina.valves.AccessLogValve"> node. If an "AccessLogValve" is not configured correctly or is missing, this is a finding. Note: The AccessLogValve should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t &quot;%r&quot; %s %b" prefix="access_log" suffix=".txt" rotatable="false" requestAttributesEnabled="true" checkExists="true"/>
Fix: F-43933r673966_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The AccessLogValve should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- VRAU-TC-000090
- Vuln IDs
-
- V-240742
- V-89913
- Rule IDs
-
- SV-240742r674398_rule
- SV-100563
Checks: C-43975r674397_chk
Navigate to and open /etc/vco/app-server/server.xml. Navigate to the <Host> node. Verify that the node contains a <Valve className="org.apache.catalina.valves.AccessLogValve"> node. If an "AccessLogValve" is not configured correctly or is missing, this is a finding. Note: The AccessLogValve should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" prefix="localhost_access_log" suffix=".txt" pattern="%h %l %u %t &quot;%r&quot; %s %b" rotatable="false" checkExists="true"/>
Fix: F-43934r673969_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The AccessLogValve should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- VRAU-TC-000095
- Vuln IDs
-
- V-240743
- V-89915
- Rule IDs
-
- SV-240743r674400_rule
- SV-100565
Checks: C-43976r674399_chk
Navigate to and open /etc/vcac/server.xml. Navigate to the <Host> node. Verify that the node contains a <Valve className="org.apache.catalina.valves.AccessLogValve"> node. If an "AccessLogValve" is not configured correctly or is missing, this is a finding. Note: The AccessLogValve should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" checkExists="true" directory="logs" pattern="%h %l %u %t &quot;%r&quot; %s %b" prefix="access_log" requestAttributesEnabled="true" rotatable="false" suffix=".txt"/>
Fix: F-43935r673972_fix
Navigate to and open /etc/vcac/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The AccessLogValve should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" checkExists="true" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="access_log" requestAttributesEnabled="true" rotatable="false" suffix=".txt"/>
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- VRAU-TC-000105
- Vuln IDs
-
- V-240744
- V-89917
- Rule IDs
-
- SV-240744r674402_rule
- SV-100567
Checks: C-43977r674401_chk
At the command prompt, execute the following command: more /storage/log/vmware/vco/app-server/catalina.out Verify that tc Server start and stop events are being logged. If the tc Server start and stop events are not being recorded, this is a finding. Note: The tc Server service is referred to as Catalina in the log.
Fix: F-43936r673975_fix
Navigate to and open /usr/share/tomcat/bin/catalina.sh. Navigate to and locate the start block : "elif [ "$1" = "start" ] ; then" Navigate to and locate both "eval" statements : "org.apache.catalina.startup.Bootstrap "$@" start \" Add this statement immediately below both of the "eval" statements : '>> "$CATALINA_OUT" 2>&1 "&"'
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- VRAU-TC-000110
- Vuln IDs
-
- V-240745
- V-89919
- Rule IDs
-
- SV-240745r674404_rule
- SV-100569
Checks: C-43978r674403_chk
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to the <Host> node. Verify that the node contains a <Valve className="org.apache.catalina.valves.AccessLogValve"> node. If an "AccessLogValve" is not configured correctly or is missing, this is a finding. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t &quot;%r&quot; %s %b" prefix="access_log" suffix=".txt" rotatable="false" requestAttributesEnabled="true" checkExists="true"/>
Fix: F-43937r673978_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- VRAU-TC-000115
- Vuln IDs
-
- V-240746
- V-89921
- Rule IDs
-
- SV-240746r674406_rule
- SV-100571
Checks: C-43979r674405_chk
Navigate to and open /etc/vco/app-server/server.xml. Navigate to the <Host> node. Verify that the node contains a <Valve className="org.apache.catalina.valves.AccessLogValve"> node. If an "AccessLogValve" is not configured correctly or is missing, this is a finding. Note: The AccessLogValve should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" prefix="localhost_access_log" suffix=".txt" pattern="%h %l %u %t &quot;%r&quot; %s %b" rotatable="false" checkExists="true"/>
Fix: F-43938r673981_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- VRAU-TC-000120
- Vuln IDs
-
- V-240747
- V-89923
- Rule IDs
-
- SV-240747r674408_rule
- SV-100573
Checks: C-43980r674407_chk
Navigate to and open /etc/vcac/server.xml. Navigate to the <Host> node. Verify that the node contains a <Valve className="org.apache.catalina.valves.AccessLogValve"> node. If an "AccessLogValve" is not configured correctly or is missing, this is a finding. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" checkExists="true" directory="logs" pattern="%h %l %u %t &quot;%r&quot; %s %b" prefix="access_log" requestAttributesEnabled="true" rotatable="false" suffix=".txt"/>
Fix: F-43939r673984_fix
Navigate to and open /etc/vcac/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" checkExists="true" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="access_log" requestAttributesEnabled="true" rotatable="false" suffix=".txt"/>
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001464
- Version
- VRAU-TC-000125
- Vuln IDs
-
- V-240748
- V-89925
- Rule IDs
-
- SV-240748r674410_rule
- SV-100575
Checks: C-43981r674409_chk
At the command prompt, execute the following command: more /usr/share/tomcat/bin/catalina.sh Type /touch "$CATALINA_OUT" Verify that the start command contains the command ">> "$CATALINA_OUT" 2>&1 "&"" If the command is not correct or is missing, this is a finding. Note: Use the "Enter" key to scroll down after typing /touch "$CATALINA_OUT"
Fix: F-43940r673987_fix
Navigate to and open Navigate to and open /usr/share/tomcat/bin/catalina.sh. Navigate to and locate the start block : "elif [ "$1" = "start" ] ; then" Navigate to and locate both "eval" statements : "org.apache.catalina.startup.Bootstrap "$@" start \" Add this statement immediately below both of the "eval" statements : '>> "$CATALINA_OUT" 2>&1 "&"'
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- VRAU-TC-000145
- Vuln IDs
-
- V-240749
- V-89933
- Rule IDs
-
- SV-240749r673991_rule
- SV-100583
Checks: C-43982r673989_chk
At the command prompt, execute the following command: tail /storage/log/vmware/horizon/localhost_access_log.YYYY-MM-dd.txt Note: Substitute the actual date in the file name. If HTTP "GET" and/or "POST" events are not being recorded, this is a finding.
Fix: F-43941r673990_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- VRAU-TC-000150
- Vuln IDs
-
- V-240750
- V-89935
- Rule IDs
-
- SV-240750r673994_rule
- SV-100585
Checks: C-43983r673992_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vco/app-server/localhost_access_log.txt If HTTP "GET" and/or "POST" events are not being recorded, this is a finding.
Fix: F-43942r673993_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- VRAU-TC-000155
- Vuln IDs
-
- V-240751
- V-89937
- Rule IDs
-
- SV-240751r673997_rule
- SV-100587
Checks: C-43984r673995_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vcac/access_log.YYYY-MM-dd.txt Note: Substitute the actual date in the file name. If HTTP "GET" and/or "POST" events are not being recorded, this is a finding.
Fix: F-43943r673996_fix
Navigate to and open /etc/vcac/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" checkExists="true" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="access_log" requestAttributesEnabled="true" rotatable="false" suffix=".txt"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- VRAU-TC-000160
- Vuln IDs
-
- V-240752
- V-89939
- Rule IDs
-
- SV-240752r674000_rule
- SV-100589
Checks: C-43985r673998_chk
At the command prompt, execute the following command: tail /storage/log/vmware/horizon/localhost_access_log.YYYY-MM-dd.txt Note: Substitute the actual date in the file name. If the time and date of events are not being recorded, this is a finding.
Fix: F-43944r673999_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- VRAU-TC-000165
- Vuln IDs
-
- V-240753
- V-89941
- Rule IDs
-
- SV-240753r674003_rule
- SV-100591
Checks: C-43986r674001_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vco/app-server/localhost_access_log.txt If the time and date of events are not being recorded, this is a finding.
Fix: F-43945r674002_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- VRAU-TC-000170
- Vuln IDs
-
- V-240754
- V-89943
- Rule IDs
-
- SV-240754r674006_rule
- SV-100593
Checks: C-43987r674004_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vcac/access_log.YYYY-MM-dd.txt Note: Substitute the actual date in the file name. If the time and date of events are not being recorded, this is a finding.
Fix: F-43946r674005_fix
Navigate to and open /etc/vcac/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" checkExists="true" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="access_log" requestAttributesEnabled="true" rotatable="false" suffix=".txt"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- VRAU-TC-000175
- Vuln IDs
-
- V-240755
- V-89945
- Rule IDs
-
- SV-240755r674009_rule
- SV-100595
Checks: C-43988r674007_chk
At the command prompt, execute the following command: tail /storage/log/vmware/horizon/localhost_access_log.YYYY-MM-dd.txt Note: Substitute the actual date in the file name. If the location of events are not being recorded, this is a finding.
Fix: F-43947r674008_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- VRAU-TC-000180
- Vuln IDs
-
- V-240756
- V-89947
- Rule IDs
-
- SV-240756r674012_rule
- SV-100597
Checks: C-43989r674010_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vco/app-server/localhost_access_log.txt If the location of events are not being recorded, this is a finding.
Fix: F-43948r674011_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- VRAU-TC-000185
- Vuln IDs
-
- V-240757
- V-89949
- Rule IDs
-
- SV-240757r674015_rule
- SV-100599
Checks: C-43990r674013_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vcac/access_log.YYYY-MM-dd.txt Note: Substitute the actual date in the file name. If the location of events are not being recorded, this is a finding.
Fix: F-43949r674014_fix
Navigate to and open /etc/vcac/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" checkExists="true" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="access_log" requestAttributesEnabled="true" rotatable="false" suffix=".txt"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- VRAU-TC-000190
- Vuln IDs
-
- V-240758
- V-89951
- Rule IDs
-
- SV-240758r674018_rule
- SV-100601
Checks: C-43991r674016_chk
At the command prompt, execute the following command: tail /storage/log/vmware/horizon/localhost_access_log.YYYY-MM-dd.txt Note: Substitute the actual date in the file name. If the source IP of events are not being recorded, this is a finding.
Fix: F-43950r674017_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- VRAU-TC-000195
- Vuln IDs
-
- V-240759
- V-89953
- Rule IDs
-
- SV-240759r674021_rule
- SV-100603
Checks: C-43992r674019_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vco/app-server/localhost_access_log.txt If the source IP of events are not being recorded, this is a finding.
Fix: F-43951r674020_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- VRAU-TC-000200
- Vuln IDs
-
- V-240760
- V-89955
- Rule IDs
-
- SV-240760r674024_rule
- SV-100605
Checks: C-43993r674022_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vcac/access_log.YYYY-MM-dd.txt Note: Substitute the actual date in the file name. If the source IP of events are not being recorded, this is a finding.
Fix: F-43952r674023_fix
Navigate to and open /etc/vcac/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" checkExists="true" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="access_log" requestAttributesEnabled="true" rotatable="false" suffix=".txt"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- VRAU-TC-000205
- Vuln IDs
-
- V-240761
- V-89957
- Rule IDs
-
- SV-240761r674412_rule
- SV-100607
Checks: C-43994r674411_chk
At the command prompt, execute the following command: tail /storage/log/vmware/horizon/localhost_access_log.YYYY-MM-dd.txt Note: Substitute the actual date in the file name. If actual client IP information, not load balancer or proxy server, is not being recorded, this is a finding.
Fix: F-43953r674026_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <RemoteIpValve> below. Note: The "RemoteIpValve" should be configured as follows: <Valve className="org.apache.catalina.valves.RemoteIpValve" httpServerPort="80" httpsServerPort="443" protocolHeader="x-forwarded-proto" proxiesHeader="x-forwarded-by" remoteIpHeader="x-forwarded-for" internalProxies="127\.0\.0\.1"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- VRAU-TC-000210
- Vuln IDs
-
- V-240762
- V-89959
- Rule IDs
-
- SV-240762r674030_rule
- SV-100609
Checks: C-43995r674028_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vco/app-server/localhost_access_log.txt If actual client IP information, not load balancer or proxy server, is not being recorded, this is a finding.
Fix: F-43954r674029_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <RemoteIpValve> below. Note: The "RemoteIpValve" should be configured as follows: <Valve className="org.apache.catalina.valves.RemoteIpValve" remoteIpHeader="x-forwarded-for" remoteIpProxiesHeader="x-forwarded-by" internalProxies=".*" protocolHeader="x-forwarded-proto" />
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- VRAU-TC-000215
- Vuln IDs
-
- V-240763
- V-89961
- Rule IDs
-
- SV-240763r674414_rule
- SV-100611
Checks: C-43996r674413_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vcac/access_log.YYYY-MM-dd.txt Note: Substitute the actual date in the file name. If actual client IP information, not load balancer or proxy server, is not being recorded, this is a finding.
Fix: F-43955r674032_fix
Navigate to and open /etc/vcac/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <RemoteIpValve> below. Note: The "RemoteIpValve" should be configured as follows: <Valve className="org.apache.catalina.valves.RemoteIpValve" httpServerPort="80" httpsServerPort="443" internalProxies="127\.0\.0\.1" protocolHeader="x-forwarded-proto" proxiesHeader="x-forwarded-by" remoteIpHeader="x-forwarded-for"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- VRAU-TC-000220
- Vuln IDs
-
- V-240764
- V-89963
- Rule IDs
-
- SV-240764r674416_rule
- SV-100613
Checks: C-43997r674415_chk
At the command prompt, execute the following command: tail /storage/log/vmware/horizon/localhost_access_log.YYYY-MM-dd.txt Note: Substitute the actual date in the file name. If the HTTP status codes are not being recorded, this is a finding. Note: HTTP status codes are 3-digit codes, which are recorded immediately after "HTTP/1.1"
Fix: F-43956r674035_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- VRAU-TC-000225
- Vuln IDs
-
- V-240765
- V-89965
- Rule IDs
-
- SV-240765r674418_rule
- SV-100615
Checks: C-43998r674417_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vco/app-server/localhost_access_log.txt If the HTTP status codes are not being recorded, this is a finding. Note: HTTP status codes are 3-digit codes, which are recorded immediately after "HTTP/1.1"
Fix: F-43957r674038_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- VRAU-TC-000230
- Vuln IDs
-
- V-240766
- V-89967
- Rule IDs
-
- SV-240766r674420_rule
- SV-100617
Checks: C-43999r674419_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vcac/access_log.YYYY-MM-dd.txt Note: Substitute the actual date in the file name. If the HTTP status codes are not being recorded, this is a finding. Note: HTTP status codes are 3-digit codes, which are recorded immediately after "HTTP/1.1"
Fix: F-43958r674041_fix
Navigate to and open /etc/vcac/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" checkExists="true" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="access_log" requestAttributesEnabled="true" rotatable="false" suffix=".txt"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- VRAU-TC-000235
- Vuln IDs
-
- V-240767
- V-89969
- Rule IDs
-
- SV-240767r674045_rule
- SV-100619
Checks: C-44000r674043_chk
At the command prompt, execute the following command: tail /storage/log/vmware/horizon/localhost_access_log.YYYY-MM-dd.txt Note: Substitute the actual date in the file name. If the identity of the user is not being recorded, this is a finding.
Fix: F-43959r674044_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- VRAU-TC-000240
- Vuln IDs
-
- V-240768
- V-89971
- Rule IDs
-
- SV-240768r674048_rule
- SV-100621
Checks: C-44001r674046_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vco/app-server/localhost_access_log.txt If the identity of the user is not being recorded, this is a finding.
Fix: F-43960r674047_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- VRAU-TC-000245
- Vuln IDs
-
- V-240769
- V-89973
- Rule IDs
-
- SV-240769r674051_rule
- SV-100623
Checks: C-44002r674049_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vcac/access_log.YYYY-MM-dd.txt Note: Substitute the actual date in the file name. If the identity of the user is not being recorded, this is a finding.
Fix: F-43961r674050_fix
Navigate to and open /etc/vcac/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" checkExists="true" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="access_log" requestAttributesEnabled="true" rotatable="false" suffix=".txt"/>
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000139
- Version
- VRAU-TC-000250
- Vuln IDs
-
- V-240770
- V-89975
- Rule IDs
-
- SV-240770r674422_rule
- SV-100625
Checks: C-44003r674421_chk
Interview the ISSO. Determine if log data and records are configured to alert the ISSO and SA in the event of processing failure. If log data and records are not configured to alert the ISSO and SA in the event of processing failure, this is a finding.
Fix: F-43962r674053_fix
Configure the web server to provide an alert to the ISSO and SA when log processing failures occur. If the web server cannot generate alerts, utilize an external logging system that meets this criterion.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- VRAU-TC-000260
- Vuln IDs
-
- V-240771
- V-89977
- Rule IDs
-
- SV-240771r674057_rule
- SV-100627
Checks: C-44004r674055_chk
At the command prompt, execute the following command: ls -lL /storage/log/vmware/horizon If any log files have permissions less restrictive than "640", this is a finding.
Fix: F-43963r674056_fix
At the command prompt, execute the following commands: chmod 640 /storage/log/vmware/horizon/<file> sed -i "/^[^#]*UMASK/ c\UMASK 077" /etc/login.defs Note: Substitute <file> with the listed file.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- VRAU-TC-000265
- Vuln IDs
-
- V-240772
- V-89979
- Rule IDs
-
- SV-240772r674060_rule
- SV-100629
Checks: C-44005r674058_chk
At the command prompt, execute the following command: ls -lL /storage/log/vmware/vco/app-server If any log files have permissions less restrictive than "640", this is a finding.
Fix: F-43964r674059_fix
At the command prompt, execute the following commands: chmod 640 /storage/log/vmware/vco/app-server/<file> sed -i "/^[^#]*UMASK/ c\UMASK 077" /etc/login.defs Note: Substitute <file> with the listed file.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- VRAU-TC-000270
- Vuln IDs
-
- V-240773
- V-89981
- Rule IDs
-
- SV-240773r674063_rule
- SV-100631
Checks: C-44006r674061_chk
At the command prompt, execute the following command: ls -lL /storage/log/vmware/vcac If any log files have permissions less restrictive than "640", this is a finding.
Fix: F-43965r674062_fix
At the command prompt, execute the following commands: chmod 640 /storage/log/vmware/vcac/<file> sed -i "/^[^#]*UMASK/ c\UMASK 077" /etc/login.defs Note: Substitute <file> with the listed file.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- VRAU-TC-000275
- Vuln IDs
-
- V-240774
- V-89983
- Rule IDs
-
- SV-240774r674424_rule
- SV-100633
Checks: C-44007r674423_chk
At the command prompt, execute the following command: ls -lL /storage/log/vmware/vcac If any log files are not owned by "root" or "vcac", this is a finding. The following files should be owned by "vcac": access_log catalina.out gc_logs host-manager localhost manager tc Server.pid The following files should be owned by "root": system-config-history telemetry toolsgc vcac-config
Fix: F-43966r674065_fix
At the command prompt, execute the following command: chown <owner>:<owner> /storage/log/vmware/vcac/<file> Note: Substitute <file> with the listed file. Note: Substitute <owner> with the correct value below. The following files should be owned by "vcac": access_log catalina.out gc_logs host-manager localhost manager tc Server.pid The following files should be owned by "root": system-config-history telemetry toolsgc vcac-config
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- VRAU-TC-000280
- Vuln IDs
-
- V-240775
- V-89985
- Rule IDs
-
- SV-240775r674069_rule
- SV-100635
Checks: C-44008r674067_chk
At the command prompt, execute the following command: ls -lL /storage/log/vmware/vco/app-server If any log files are not owned by "vco", this is a finding.
Fix: F-43967r674068_fix
At the command prompt, execute the following command: chown vco:vco /storage/log/vmware/vco/app-server/<file> Note: Substitute <file> with the listed file.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- VRAU-TC-000285
- Vuln IDs
-
- V-240776
- V-89987
- Rule IDs
-
- SV-240776r674072_rule
- SV-100637
Checks: C-44009r674070_chk
At the command prompt, execute the following command: ls -lL /storage/log/vmware/vcac If any log files are not owned by "root" or "vcac", this is a finding.
Fix: F-43968r674071_fix
At the command prompt, execute the following command: Set the owner & group of these files: access_log.txt, audit.log, catalina.log, catalina.out, gc_logs.log.0.current, host-manager.log, localhost.log, manager.log, and tomcat.pid to vcac, with the following command: chown vcac:vcac /storage/log/vmware/vcac/<file> Set all other files not listed above to the owner and group of root, with the following command: chown root:root /storage/log/vmware/vcac/<file> Note: Substitute <file> with the listed file.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- VRAU-TC-000290
- Vuln IDs
-
- V-240777
- V-89989
- Rule IDs
-
- SV-240777r674075_rule
- SV-100639
Checks: C-44010r674073_chk
At the command prompt, execute the following command: ls -lL /storage/log/vmware/horizon If any log files are not group-owned by "www", this is a finding.
Fix: F-43969r674074_fix
At the command prompt, execute the following command: chown horizon:www /storage/log/vmware/horizon/<file> Note: Substitute <file> with the listed file.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- VRAU-TC-000295
- Vuln IDs
-
- V-240778
- V-89991
- Rule IDs
-
- SV-240778r674078_rule
- SV-100641
Checks: C-44011r674076_chk
At the command prompt, execute the following command: ls -lL /storage/log/vmware/vco/app-server If any log files are not group-owned by "vco", this is a finding.
Fix: F-43970r674077_fix
At the command prompt, execute the following command: chown vco:vco /storage/log/vmware/vco/app-server/<file> Note: Substitute <file> with the listed file.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- VRAU-TC-000300
- Vuln IDs
-
- V-240779
- V-89993
- Rule IDs
-
- SV-240779r674081_rule
- SV-100643
Checks: C-44012r674079_chk
At the command prompt, execute the following command: ls -lL /storage/log/vmware/vcac If any log files are not group-owned by "root", this is a finding.
Fix: F-43971r674080_fix
At the command prompt, execute the following command: chown root:root /storage/log/vmware/vcac/<file> Note: Substitute <file> with the listed file.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001348
- Version
- VRAU-TC-000305
- Vuln IDs
-
- V-240780
- V-89995
- Rule IDs
-
- SV-240780r674084_rule
- SV-100645
Checks: C-44013r674082_chk
Interview the ISSO. Determine if log data and records are not being backed up onto a different system or media. If log data and records are not being backed up onto a different system or media, this is a finding.
Fix: F-43972r674083_fix
Ensure log data and records are being backed up to a different system or separate media.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- VRAU-TC-000310
- Vuln IDs
-
- V-240781
- V-89997
- Rule IDs
-
- SV-240781r674426_rule
- SV-100647
Checks: C-44014r674425_chk
Interview the ISSO. Determine whether web server files are being fully reviewed, tested, and signed before being implemented into the production environment. If the web server files are not being fully reviewed, tested, and signed before being implemented into the production environment, this is a finding.
Fix: F-43973r674086_fix
Configure the web server to verify object integrity before becoming part of the production web server or utilize an external tool designed to meet this requirement.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- VRAU-TC-000315
- Vuln IDs
-
- V-240782
- V-89999
- Rule IDs
-
- SV-240782r674428_rule
- SV-100649
Checks: C-44015r674427_chk
Interview the ISSO. Determine whether expansion modules are being fully reviewed, tested, and signed before being implemented into the production environment. If the expansion modules are not being fully reviewed, tested, and signed before being implemented into the production environment, this is a finding.
Fix: F-43974r674089_fix
Configure the web server to enforce, internally or through an external utility, the review, testing and signing of modules before implementation into the production environment.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-TC-000320
- Vuln IDs
-
- V-240783
- V-90001
- Rule IDs
-
- SV-240783r674093_rule
- SV-100651
Checks: C-44016r674091_chk
At the command prompt, execute the following command: cat /opt/vmware/horizon/workspace/conf/tomcat-users.xml If "tomcat-users.xml" file contains any user information, this is a finding.
Fix: F-43975r674092_fix
Contact the ISSO and/or SA. Determine why user data is being stored in "tomcat-users.xml". If the user data is not required then it should be removed. The vRA appliance does not maintain user data in this file by default.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-TC-000325
- Vuln IDs
-
- V-240784
- V-90003
- Rule IDs
-
- SV-240784r674096_rule
- SV-100653
Checks: C-44017r674094_chk
At the command prompt, execute the following command: cat /etc/vco/app-server/tomcat-users.xml If "tomcat-users.xml" file contains any user information, this is a finding.
Fix: F-43976r674095_fix
Contact the ISSO and/or SA. Determine why user data is being stored in "tomcat-users.xml". If the user data is not required then it should be removed. The vRA appliance does not maintain user data in this file by default.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-TC-000330
- Vuln IDs
-
- V-240785
- V-90005
- Rule IDs
-
- SV-240785r674099_rule
- SV-100655
Checks: C-44018r674097_chk
At the command prompt, execute the following command: cat /etc/vcac/tomcat-users.xml If "tomcat-users.xml" file contains any user information, this is a finding.
Fix: F-43977r674098_fix
Contact the ISSO and/or SA. Determine why user data is being stored in "tomcat-users.xml". If the user data is not required then it should be removed. The vRA appliance does not maintain user data in this file by default.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-TC-000335
- Vuln IDs
-
- V-240786
- V-90007
- Rule IDs
-
- SV-240786r674430_rule
- SV-100657
Checks: C-44019r674429_chk
Interview the ISSO. Review the web server documentation and deployed configuration to determine if web server features, services, and processes are installed that are not needed for hosted application deployment. If excessive features, services, and processes are installed, this is a finding.
Fix: F-43978r674101_fix
Uninstall or deactivate features, services, and processes not needed by the web server for operation.
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000381
- Version
- VRAU-TC-000345
- Vuln IDs
-
- V-240787
- V-90009
- Rule IDs
-
- SV-240787r674432_rule
- SV-100659
Checks: C-44020r674431_chk
Interview the ISSO. Review the web server documentation and deployed configuration to determine if documentation, sample code, example applications, and tutorials have been removed. If documentation, sample code, example applications, and tutorials have not been removed, this is a finding.
Fix: F-43979r674104_fix
Remove all documentation, sample code, example applications, and tutorials.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-TC-000355
- Vuln IDs
-
- V-240788
- V-90345
- Rule IDs
-
- SV-240788r674470_rule
- SV-100995
Checks: C-44021r674469_chk
Interview the ISSO. Review the web server documentation and deployed configuration to determine if utility programs, services, plug-ins, and modules not necessary for operation have been removed. If utility programs, services, plug-ins, and modules not necessary for operation have not been removed, this is a finding.
Fix: F-43980r674107_fix
Remove all utility programs, services, plug-ins, and modules not necessary for operation.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-TC-000360
- Vuln IDs
-
- V-240789
- V-90011
- Rule IDs
-
- SV-240789r674111_rule
- SV-100661
Checks: C-44022r674109_chk
At the command prompt, execute the following command: find / -name 'web.xml' -print0 | xargs -0r grep -HEn '(x-csh<)|(x-sh<)|(x-shar<)|(x-ksh<)' If the command produces any output, this is a finding.
Fix: F-43981r674110_fix
Navigate to a file that was listed. Open the file in a text editor. Delete any of the following types: application/x-sh application/x-shar application/x-csh application/x-ksh
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-TC-000365
- Vuln IDs
-
- V-240790
- V-90013
- Rule IDs
-
- SV-240790r674114_rule
- SV-100663
Checks: C-44023r674112_chk
Interview the ISSO. Review the web server documentation and deployed configuration to determine if all mappings to unused and vulnerable scripts to be removed. If all mappings to unused and vulnerable scripts have not been removed, this is a finding.
Fix: F-43982r674113_fix
Remove script mappings that are not needed for web server and hosted application operation.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-TC-000370
- Vuln IDs
-
- V-240791
- V-90015
- Rule IDs
-
- SV-240791r674117_rule
- SV-100665
Checks: C-44024r674115_chk
At the command prompt, execute the following command: grep -E '<url-pattern>\*\.jsp</url-pattern>' -B 2 -A 2 /opt/vmware/horizon/workspace/conf/web.xml If the jsp and jspx file extensions have not been mapped to the JSP servlet, this is a finding.
Fix: F-43983r674116_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/web.xml. Navigate to and locate the mapping for the JSP servlet. It is the <servlet-mapping> node that contains <servlet-name>jsp</servlet-name>. Configure the <servlet-mapping> node to look like the code snippet below: <!-- The mappings for the JSP servlet --> <servlet-mapping> <servlet-name>jsp</servlet-name> <url-pattern>*.jsp</url-pattern> <url-pattern>*.jspx</url-pattern> </servlet-mapping>
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-TC-000375
- Vuln IDs
-
- V-240792
- V-90017
- Rule IDs
-
- SV-240792r674120_rule
- SV-100667
Checks: C-44025r674118_chk
At the command prompt, execute the following command: grep -E '<url-pattern>\*\.jsp</url-pattern>' -B 2 -A 2 /etc/vco/app-server/web.xml If the jsp and jspx file extensions have not been mapped to the JSP servlet, this is a finding.
Fix: F-43984r674119_fix
Navigate to and open /etc/vco/app-server/web.xml. Navigate to and locate the mapping for the JSP servlet. It is the <servlet-mapping> node that contains <servlet-name>jsp</servlet-name>. Configure the <servlet-mapping> node to look like the code snippet below: <!-- The mappings for the JSP servlet --> <servlet-mapping> <servlet-name>jsp</servlet-name> <url-pattern>*.jsp</url-pattern> <url-pattern>*.jspx</url-pattern> </servlet-mapping>
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-TC-000380
- Vuln IDs
-
- V-240793
- V-90019
- Rule IDs
-
- SV-240793r674123_rule
- SV-100669
Checks: C-44026r674121_chk
At the command prompt, execute the following command: grep -E '<url-pattern>\*\.jsp</url-pattern>' -B 2 -A 2 /etc/vcac/web.xml If the jsp and jspx file extensions have not been mapped to the JSP servlet, this is a finding.
Fix: F-43985r674122_fix
Navigate to and open /etc/vcac/web.xml. Navigate to and locate the mapping for the JSP servlet. It is the <servlet-mapping> node that contains <servlet-name>jsp</servlet-name>. Configure the <servlet-mapping> node to look like the code snippet below: <!-- The mappings for the JSP servlet --> <servlet-mapping> <servlet-name>jsp</servlet-name> <url-pattern>*.jsp</url-pattern> <url-pattern>*.jspx</url-pattern> </servlet-mapping>
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-TC-000385
- Vuln IDs
-
- V-240794
- V-90021
- Rule IDs
-
- SV-240794r674126_rule
- SV-100671
Checks: C-44027r674124_chk
At the command prompt, execute the following command: find / -name 'web.xml' -print0 | xargs -0r grep -HEn 'webdav' If the command produces any output, this is a finding.
Fix: F-43986r674125_fix
Navigate to and open all listed files. Navigate to and locate the mapping for the JSP servlet. It is the <servlet-mapping> node that contains <servlet-name>webdav</servlet-name>. Remove the WebDAV servlet and any mapping associated with it.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-TC-000390
- Vuln IDs
-
- V-240795
- V-90023
- Rule IDs
-
- SV-240795r674129_rule
- SV-100673
Checks: C-44028r674127_chk
At the command prompt, execute the following command: grep JreMemoryLeakPreventionListener /opt/vmware/horizon/workspace/conf/server.xml If the JreMemoryLeakPreventionListener <Listener> node is not listed, this is a finding.
Fix: F-43987r674128_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to the <Server> node. Add '<Listener className="org.apache.catalina.core.JreMemoryLeakPreventionListener"/>' to the <Server> node.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-TC-000395
- Vuln IDs
-
- V-240796
- V-90025
- Rule IDs
-
- SV-240796r674132_rule
- SV-100675
Checks: C-44029r674130_chk
At the command prompt, execute the following command: grep JreMemoryLeakPreventionListener /etc/vco/app-server/server.xml If the JreMemoryLeakPreventionListener <Listener> node is not listed, this is a finding.
Fix: F-43988r674131_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to the <Server> node. Add '<Listener className="org.apache.catalina.core.JreMemoryLeakPreventionListener"/>' to the <Server> node.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-TC-000400
- Vuln IDs
-
- V-240797
- V-90027
- Rule IDs
-
- SV-240797r674135_rule
- SV-100677
Checks: C-44030r674133_chk
At the command prompt, execute the following command: grep JreMemoryLeakPreventionListener /etc/vcac/server.xml If the JreMemoryLeakPreventionListener <Listener> node is not listed, this is a finding.
Fix: F-43989r674134_fix
Navigate to and open /etc/vcac/server.xml. Navigate to the <Server> node. Add '<Listener className="org.apache.catalina.core.JreMemoryLeakPreventionListener"/>' to the <Server> node.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-TC-000410
- Vuln IDs
-
- V-240798
- V-90029
- Rule IDs
-
- SV-240798r674138_rule
- SV-100679
Checks: C-44031r674136_chk
At the command prompt, execute the following command: ls -lR /usr/lib/vco/configuration/webapps | grep '^l' If the command produces any output, this is a finding.
Fix: F-43990r674137_fix
At the command prompt, execute the following commands: Note: Replace <file_name> for the name of any files that were returned. unlink <file_name> Repeat the commands for each file that was returned.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- VRAU-TC-000420
- Vuln IDs
-
- V-240799
- V-90031
- Rule IDs
-
- SV-240799r674141_rule
- SV-100681
Checks: C-44032r674139_chk
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. If either the IP address or the port is not specified for each <Connector>, this is a finding.
Fix: F-43991r674140_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. Configure each <Connector> node with the value 'address="XXXXX"'. Note: Replace XXXXX with the appropriate address for that node.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- VRAU-TC-000425
- Vuln IDs
-
- V-240800
- V-90033
- Rule IDs
-
- SV-240800r674144_rule
- SV-100683
Checks: C-44033r674142_chk
Navigate to and open /etc/vco/app-server/server.xml. Navigate to the <Connector> node. If either the IP address or the port is not specified for the <Connector>, this is a finding.
Fix: F-43992r674143_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to the <Connector> node. Configure the <Connector> node with the value 'address="XXXXX"'. Note: Replace XXXXX with the appropriate address for that node.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- VRAU-TC-000430
- Vuln IDs
-
- V-240801
- V-90035
- Rule IDs
-
- SV-240801r674147_rule
- SV-100685
Checks: C-44034r674145_chk
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. If either the IP address or the port is not specified for the <Connector>, this is a finding.
Fix: F-43993r674146_fix
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. Configure the <Connector> node with the value 'address="XXXXX"'. Note: Replace XXXXX with the appropriate address for that node.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- VRAU-TC-000435
- Vuln IDs
-
- V-240802
- V-90037
- Rule IDs
-
- SV-240802r674150_rule
- SV-100687
Checks: C-44035r674148_chk
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. If the value of "SSLEnabled" is not set to "true" or is missing, this is a finding.
Fix: F-43994r674149_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. Configure each <Connector> node with the value 'SSLEnabled="true"'.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- VRAU-TC-000440
- Vuln IDs
-
- V-240803
- V-90039
- Rule IDs
-
- SV-240803r674153_rule
- SV-100689
Checks: C-44036r674151_chk
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. If the value of "SSLEnabled" is not set to "true" or is missing, this is a finding.
Fix: F-43995r674152_fix
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. Configure each <Connector> node with the value 'SSLEnabled="true"'.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- VRAU-TC-000445
- Vuln IDs
-
- V-240804
- V-90041
- Rule IDs
-
- SV-240804r674434_rule
- SV-100691
Checks: C-44037r674433_chk
If PKI is not being used, this check is Not Applicable. Interview the ISSO. Review tc Server ALL configuration to verify that certificates being provided by the client are being validated in accordance with RFC 5280. If certificates are not being validated in accordance with RFC 5280, this is a finding.
Fix: F-43996r674155_fix
If PKI is not being used, this check is Not Applicable. Validate client certificates in accordance with RFC 5280.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- VRAU-TC-000450
- Vuln IDs
-
- V-240805
- V-90347
- Rule IDs
-
- SV-240805r674472_rule
- SV-100997
Checks: C-44038r674471_chk
At the command prompt, execute the following command: ls -al /opt/vmware/horizon/workspace/conf/tcserver.keystore Verify that file permissions are set to "640" or more restrictive. Verify that the owner is horizon and group-owner is www. If either of these conditions are not met, this is a finding.
Fix: F-43997r674158_fix
At the command prompt, execute the following commands: chown horizon:www /opt/vmware/horizon/workspace/conf/tcserver.keystore chmod 640 /opt/vmware/horizon/workspace/conf/tcserver.keystore
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- VRAU-TC-000460
- Vuln IDs
-
- V-240806
- V-90043
- Rule IDs
-
- SV-240806r674436_rule
- SV-100693
Checks: C-44039r674435_chk
At the command prompt, execute the following command: grep bio-ssl.cipher.list /opt/vmware/horizon/workspace/conf/catalina.properties If the value of "bio-ssl.cipher.list" does not match the list of FIPS 140-2 ciphers or is missing, this is a finding. Note: To view a list of FIPS 140-2 ciphers, at the command prompt execute the following command: openssl ciphers 'FIPS'
Fix: F-43998r674161_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/catalina.properties. Navigate to and locate "bio-ssl.cipher.list". Configure the "bio-ssl.cipher.list" with FIPS 140-2 compliant ciphers.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- VRAU-TC-000465
- Vuln IDs
-
- V-240807
- V-90045
- Rule IDs
-
- SV-240807r674438_rule
- SV-100695
Checks: C-44040r674437_chk
At the command prompt, execute the following command: grep cipher /etc/vcac/catalina.properties If the value of "cipher" does not match the list of FIPS 140-2 ciphers or is missing, this is a finding. Note: To view a list of FIPS 140-2 ciphers, at the command prompt execute the following command: openssl ciphers 'FIPS'
Fix: F-43999r674164_fix
Navigate to and open /etc/vcac/catalina.properties. Navigate to and locate "cipher". Configure the "cipher" with FIPS 140-2 compliant ciphers.
- RMF Control
- SC-2
- Severity
- H
- CCI
- CCI-001082
- Version
- VRAU-TC-000475
- Vuln IDs
-
- V-240808
- V-90047
- Rule IDs
-
- SV-240808r674168_rule
- SV-100697
Checks: C-44041r674166_chk
At the command prompt, execute the following command: ls -alR /opt/vmware/horizon/workspace/webapps | grep -E '^-' | awk '$3 !~ /horizon|root/ {print}' If the command produces any output, this is a finding.
Fix: F-44000r674167_fix
At the command prompt, execute the following command: chown horizon:www <file_name> Repeat the command for each file that was returned. Note: Replace <file_name> for the name of the file that was returned.
- RMF Control
- SC-2
- Severity
- H
- CCI
- CCI-001082
- Version
- VRAU-TC-000480
- Vuln IDs
-
- V-240809
- V-90049
- Rule IDs
-
- SV-240809r674171_rule
- SV-100699
Checks: C-44042r674169_chk
At the command prompt, execute the following command: ls -lL /usr/lib/vco/configuration/webapps If the listed files are not owned by "vco", this is a finding.
Fix: F-44001r674170_fix
At the command prompt, execute the following command: chown vco:vco <file_name> Repeat the command for each file that was returned. Note: Replace <file_name> for the name of the file that was returned.
- RMF Control
- SC-2
- Severity
- H
- CCI
- CCI-001082
- Version
- VRAU-TC-000485
- Vuln IDs
-
- V-240810
- V-90051
- Rule IDs
-
- SV-240810r674174_rule
- SV-100701
Checks: C-44043r674172_chk
At the command prompt, execute the following command: ls -alR /etc/vcac /usr/lib/vcac/server/webapps | grep -E '^-' | awk '$3 !~ /vcac|root/ {print}' If the command produces any output, this is a finding.
Fix: F-44002r674173_fix
At the command prompt, execute the following command: If the file was found in /etc/vcac or /usr/lib/vcac/server/webapps, execute the following command: chown vcac:vcac <file_name> Note: Replace <file_name> for the name of the file that was returned.
- RMF Control
- SC-2
- Severity
- H
- CCI
- CCI-001082
- Version
- VRAU-TC-000490
- Vuln IDs
-
- V-240811
- V-90053
- Rule IDs
-
- SV-240811r674177_rule
- SV-100703
Checks: C-44044r674175_chk
At the command prompt, execute the following command: ls -alR /opt/vmware/horizon/workspace | grep -E '^-' | awk '$1 !~ /---$/ {print}' If the command produces any output, this is a finding.
Fix: F-44003r674176_fix
At the command prompt, execute the following command: chmod 750 <file_name> Repeat the command for each file that was returned. Note: Replace <file_name> for the name of the file that was returned.
- RMF Control
- SC-2
- Severity
- H
- CCI
- CCI-001082
- Version
- VRAU-TC-000495
- Vuln IDs
-
- V-240812
- V-90055
- Rule IDs
-
- SV-240812r674180_rule
- SV-100705
Checks: C-44045r674178_chk
At the command prompt, execute the following command: ls -alR /etc/vco /usr/lib/vco/app-server | grep -E '^-' | awk '$1 !~ /---$/ {print}' If anything is returned, this is a finding.
Fix: F-44004r674179_fix
At the command prompt, execute the following command: chmod 750 <file_name> Repeat the command for each file that was returned. Note: Replace <file_name> for the name of the file that was returned.
- RMF Control
- SC-2
- Severity
- H
- CCI
- CCI-001082
- Version
- VRAU-TC-000500
- Vuln IDs
-
- V-240813
- V-90057
- Rule IDs
-
- SV-240813r674183_rule
- SV-100707
Checks: C-44046r674181_chk
At the command prompt, execute the following command: ls -alR /etc/vcac /usr/lib/vcac/server/webapps | grep -E '^-' | awk '$1 !~ /---$/ {print}' If the command produces any output, this is a finding.
Fix: F-44005r674182_fix
At the command prompt, execute the following command: chmod 750 <file_name> Repeat the command for each file that was returned. Note: Replace <file_name> for the name of the file that was returned.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- VRAU-TC-000550
- Vuln IDs
-
- V-240814
- V-90059
- Rule IDs
-
- SV-240814r674186_rule
- SV-100709
Checks: C-44047r674184_chk
Interview the ISSO. Review the web server documentation and deployed configuration to determine if the tc Server code baseline is documented and maintained. If the tc Server code baseline is not documented and maintained, this is a finding.
Fix: F-44006r674185_fix
Develop baseline documentation of the tc Server codebase.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- VRAU-TC-000555
- Vuln IDs
-
- V-240815
- V-90061
- Rule IDs
-
- SV-240815r674189_rule
- SV-100711
Checks: C-44048r674187_chk
At the command line, execute the following command: grep EXIT_ON_INIT_FAILURE /opt/vmware/horizon/workspace/conf/catalina.properties If the "org.apache.catalina.startup.EXIT_ON_INIT_FAILURE" setting is not set to "true" or is missing, this is a finding.
Fix: F-44007r674188_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/catalina.properties. Configure the setting "org.apache.catalina.startup.EXIT_ON_INIT_FAILURE" with the value "true". Note: The word "true" should not be surrounded with any quote characters.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- VRAU-TC-000560
- Vuln IDs
-
- V-240816
- V-90063
- Rule IDs
-
- SV-240816r674192_rule
- SV-100713
Checks: C-44049r674190_chk
At the command line, execute the following command: grep EXIT_ON_INIT_FAILURE /etc/vco/app-server/catalina.properties If the "org.apache.catalina.startup.EXIT_ON_INIT_FAILURE" setting is not set to "true" or is missing, this is a finding.
Fix: F-44008r674191_fix
Navigate to and open /etc/vco/app-server/catalina.properties. Configure the setting "org.apache.catalina.startup.EXIT_ON_INIT_FAILURE" with the value "true". Note: The word "true" should not be surrounded with any quote characters.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- VRAU-TC-000565
- Vuln IDs
-
- V-240817
- V-90065
- Rule IDs
-
- SV-240817r674195_rule
- SV-100715
Checks: C-44050r674193_chk
At the command line, execute the following command: grep EXIT_ON_INIT_FAILURE /etc/vcac/catalina.properties If the "org.apache.catalina.startup.EXIT_ON_INIT_FAILURE" setting is not set to "true" or is missing, this is a finding.
Fix: F-44009r674194_fix
Navigate to and open /etc/vcac/catalina.properties. Configure the setting "org.apache.catalina.startup.EXIT_ON_INIT_FAILURE" with the value "true". Note: The word "true" should not be surrounded with any quote characters.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- VRAU-TC-000580
- Vuln IDs
-
- V-240818
- V-90067
- Rule IDs
-
- SV-240818r674198_rule
- SV-100717
Checks: C-44051r674196_chk
At the command prompt, execute the following commands: df -k /usr/java/jre-vmware df -k /opt/vmware/horizon/workspace/webapps If the two directories above are on the same partition, this is a finding.
Fix: F-44010r674197_fix
Consult with the ISSO. Move the tc Server HORIZON /opt/vmware/horizon/workspace/webapps folder to a separate partition.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- VRAU-TC-000585
- Vuln IDs
-
- V-240819
- V-90069
- Rule IDs
-
- SV-240819r674201_rule
- SV-100719
Checks: C-44052r674199_chk
At the command prompt, execute the following commands: df -k /usr/java/jre-vmware df -k /usr/lib/vco/configuration/webapps If the two directories above are on the same partition, this is a finding.
Fix: F-44011r674200_fix
Consult with the ISSO. Move the tc Server VCO /usr/lib/vco/configuration/webapps folder to a separate partition.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- VRAU-TC-000590
- Vuln IDs
-
- V-240820
- V-90071
- Rule IDs
-
- SV-240820r674204_rule
- SV-100721
Checks: C-44053r674202_chk
At the command prompt, execute the following commands: df -k /usr/java/jre-vmware df -k /usr/lib/vcac/server/webapps If the two directories above are on the same partition, this is a finding.
Fix: F-44012r674203_fix
Consult with the ISSO. Move the tc Server VCAC /usr/lib/vcac/server/webapps folder to a separate partition.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- VRAU-TC-000610
- Vuln IDs
-
- V-240824
- V-90079
- Rule IDs
-
- SV-240824r674216_rule
- SV-100729
Checks: C-44057r674214_chk
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. If the value of "URIEncoding" is not set to "UTF-8" or is missing, this is a finding.
Fix: F-44016r674215_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. Configure each <Connector> node with the value 'URIEncoding="UTF-8"'.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- VRAU-TC-000615
- Vuln IDs
-
- V-240825
- V-90081
- Rule IDs
-
- SV-240825r674219_rule
- SV-100731
Checks: C-44058r674217_chk
Navigate to and open /etc/vco/app-server/server.xml. Navigate to the <Connector> node. If the value of "URIEncoding" is not set to "UTF-8" or is missing, this is a finding.
Fix: F-44017r674218_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to the <Connector> node. Configure each <Connector> node with the value 'URIEncoding="UTF-8"'.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- VRAU-TC-000620
- Vuln IDs
-
- V-240826
- V-90083
- Rule IDs
-
- SV-240826r674222_rule
- SV-100733
Checks: C-44059r674220_chk
Navigate to and open /opt/vmware/horizon/workspace/conf/web.xml. Verify that the 'setCharacterEncodingFilter' <filter> has been specified. If the "setCharacterEncodingFilter" filter has not been specified or is commented out, this is a finding.
Fix: F-44018r674221_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/web.xml. Configure the <web-app> node with the <filter> node listed below. <filter> <filter-name>setCharacterEncodingFilter</filter-name> <filter-class>org.apache.catalina.filters.SetCharacterEncodingFilter</filter-class> <init-param> <param-name>encoding</param-name> <param-value>UTF-8</param-value> <param-name>ignore</param-name> <param-value>false</param-value> </init-param> <async-supported>true</async-supported> </filter>
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- VRAU-TC-000625
- Vuln IDs
-
- V-240827
- V-90085
- Rule IDs
-
- SV-240827r674225_rule
- SV-100735
Checks: C-44060r674223_chk
Navigate to and open /etc/vco/app-server/web.xml. Verify that the 'setCharacterEncodingFilter' <filter> has been specified. If the "setCharacterEncodingFilter" filter has not been specified or is commented out, this is a finding.
Fix: F-44019r674224_fix
Navigate to and open /etc/vco/app-server/web.xml. Configure the <web-app> node with the <filter> node listed below. <filter> <filter-name>setCharacterEncodingFilter</filter-name> <filter-class>org.apache.catalina.filters.SetCharacterEncodingFilter</filter-class> <init-param> <param-name>encoding</param-name> <param-value>UTF-8</param-value> <param-name>ignore</param-name> <param-value>false</param-value> </init-param> <async-supported>true</async-supported> </filter>
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- VRAU-TC-000630
- Vuln IDs
-
- V-240828
- V-90087
- Rule IDs
-
- SV-240828r674228_rule
- SV-100737
Checks: C-44061r674226_chk
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. If the value of "URIEncoding" is not set to "UTF-8" or is missing, this is a finding.
Fix: F-44020r674227_fix
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. Configure the <Connector> node with the value 'URIEncoding="UTF-8"'.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- VRAU-TC-000635
- Vuln IDs
-
- V-240829
- V-90089
- Rule IDs
-
- SV-240829r674231_rule
- SV-100739
Checks: C-44062r674229_chk
Navigate to and open /etc/vcac/web.xml. Verify that the 'setCharacterEncodingFilter' <filter> has been specified. If the "setCharacterEncodingFilter" filter has not been specified or is commented out, this is a finding.
Fix: F-44021r674230_fix
Navigate to and open /etc/vcac/web.xml. Configure the <web-app> node with the <filter> node listed below. <filter> <filter-name>setCharacterEncodingFilter</filter-name> <filter-class>org.apache.catalina.filters.SetCharacterEncodingFilter</filter-class> <init-param> <param-name>encoding</param-name> <param-value>UTF-8</param-value> <param-name>ignore</param-name> <param-value>false</param-value> </init-param> <async-supported>true</async-supported> </filter>
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VRAU-TC-000640
- Vuln IDs
-
- V-240830
- V-90091
- Rule IDs
-
- SV-240830r674234_rule
- SV-100741
Checks: C-44063r674232_chk
At the command prompt, execute the following command: grep -E -A 4 '<welcome-file-list' /opt/vmware/horizon/workspace/conf/web.xml If a <welcome-file> node is not set to a default web page, this is a finding.
Fix: F-44022r674233_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/web.xml. Inspect the file and ensure that it contains the below section: <welcome-file-list> <welcome-file>index.html</welcome-file> <welcome-file>index.htm</welcome-file> <welcome-file>index.jsp</welcome-file> </welcome-file-list>
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VRAU-TC-000645
- Vuln IDs
-
- V-240831
- V-90093
- Rule IDs
-
- SV-240831r674237_rule
- SV-100743
Checks: C-44064r674235_chk
At the command prompt, execute the following command: grep -E -A 4 '<welcome-file-list' /etc/vco/app-server/web.xml If a <welcome-file> node is not set to a default web page, this is a finding.
Fix: F-44023r674236_fix
Navigate to and open /etc/vco/app-server/web.xml. Inspect the file and ensure that it contains the below section: <welcome-file-list> <welcome-file>index.html</welcome-file> <welcome-file>index.htm</welcome-file> <welcome-file>index.jsp</welcome-file> </welcome-file-list>
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VRAU-TC-000650
- Vuln IDs
-
- V-240832
- V-90095
- Rule IDs
-
- SV-240832r674240_rule
- SV-100745
Checks: C-44065r674238_chk
At the command prompt, execute the following command: grep -E -A 4 '<welcome-file-list' /etc/vcac/web.xml If a <welcome-file> node is not set to a default web page, this is a finding.
Fix: F-44024r674239_fix
Navigate to and open /etc/vcac/web.xml. Inspect the file and ensure that it contains the below section: <welcome-file-list> <welcome-file>index.html</welcome-file> <welcome-file>index.htm</welcome-file> <welcome-file>index.jsp</welcome-file> </welcome-file-list>
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VRAU-TC-000660
- Vuln IDs
-
- V-240833
- V-90097
- Rule IDs
-
- SV-240833r674243_rule
- SV-100747
Checks: C-44066r674241_chk
At the command prompt, execute the following command: grep allowTrace /opt/vmware/horizon/workspace/conf/server.xml If "allowTrace" is set to "true", this is a finding. Note: If no line is returned this is NOT a finding.
Fix: F-44025r674242_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to and locate 'allowTrace="true"'. Remove the 'allowTrace="true"' setting.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VRAU-TC-000665
- Vuln IDs
-
- V-240834
- V-90099
- Rule IDs
-
- SV-240834r674246_rule
- SV-100749
Checks: C-44067r674244_chk
At the command prompt, execute the following command: grep allowTrace /etc/vco/app-server/server.xml If "allowTrace" is set to "true", this is a finding. Note: If no line is returned this is NOT a finding.
Fix: F-44026r674245_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to and locate 'allowTrace="true"'. Remove the 'allowTrace="true"' setting.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VRAU-TC-000670
- Vuln IDs
-
- V-240835
- V-90101
- Rule IDs
-
- SV-240835r674249_rule
- SV-100751
Checks: C-44068r674247_chk
At the command prompt, execute the following command: grep allowTrace /etc/vcac/server.xml If "allowTrace" is set to "true", this is a finding. Note: If no line is returned this is NOT a finding.
Fix: F-44027r674248_fix
Navigate to and open /etc/vcac/server.xml. Navigate to and locate 'allowTrace="true"'. Remove the 'allowTrace="true"' setting.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VRAU-TC-000675
- Vuln IDs
-
- V-240836
- V-90103
- Rule IDs
-
- SV-240836r674252_rule
- SV-100753
Checks: C-44069r674250_chk
At the command prompt, execute the following command: grep -En -A 2 -B 1 '<param-name>debug</param-name>' /opt/vmware/horizon/workspace/conf/web.xml If all instances of the debug parameter are not set to "0", this is a finding.
Fix: F-44028r674251_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/web.xml. Navigate to all <debug> nodes that are not set to "0". Set the <param-value> to "0" in all <param-name>debug</param-name> nodes. Note: The debug setting should look like the below: <init-param> <param-name>debug</param-name> <param-value>0</param-value> </init-param>
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VRAU-TC-000680
- Vuln IDs
-
- V-240837
- V-90105
- Rule IDs
-
- SV-240837r674255_rule
- SV-100755
Checks: C-44070r674253_chk
At the command prompt, execute the following command: grep -En -A 2 -B 1 '<param-name>debug</param-name>' /etc/vco/app-server/web.xml If all instances of the debug parameter are not set to "0", this is a finding.
Fix: F-44029r674254_fix
Navigate to and open /etc/vco/app-server/web.xml. Navigate to all <debug> nodes that are not set to "0". Set the <param-value> to "0" in all <param-name>debug</param-name> nodes. Note: The debug setting should look like the below: <init-param> <param-name>debug</param-name> <param-value>0</param-value> </init-param>
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VRAU-TC-000685
- Vuln IDs
-
- V-240838
- V-90107
- Rule IDs
-
- SV-240838r674258_rule
- SV-100757
Checks: C-44071r674256_chk
At the command prompt, execute the following command: grep -En -A 2 -B 1 '<param-name>debug</param-name>' /etc/vcac/web.xml If all instances of the debug parameter are not set to "0", this is a finding.
Fix: F-44030r674257_fix
Navigate to and open /etc/vcac/web.xml. Navigate to all <debug> nodes that are not set to "0". Set the <param-value> to "0" in all <param-name>debug</param-name> nodes. Note: The debug setting should look like the below: <init-param> <param-name>debug</param-name> <param-value>0</param-value> </init-param>
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- VRAU-TC-000695
- Vuln IDs
-
- V-240839
- V-90109
- Rule IDs
-
- SV-240839r674261_rule
- SV-100759
Checks: C-44072r674259_chk
At the command prompt, execute the following command: grep session-timeout /opt/vmware/horizon/workspace/conf/web.xml If the value of <session-timeout> is not "30" or is missing, this is a finding.
Fix: F-44031r674260_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/web.xml. Navigate to the <session-config> node. Add the <session-timeout>30</session-timeout> node setting to the <session-config> node.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- VRAU-TC-000700
- Vuln IDs
-
- V-240840
- V-90111
- Rule IDs
-
- SV-240840r674264_rule
- SV-100761
Checks: C-44073r674262_chk
At the command prompt, execute the following command: grep session-timeout /etc/vco/app-server/web.xml If the value of <session-timeout> is not "30" or is missing, this is a finding.
Fix: F-44032r674263_fix
Navigate to and open /etc/vco/app-server/web.xml. Navigate to the <session-config> node. Add the <session-timeout>30</session-timeout> node setting to the <session-config> node.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- VRAU-TC-000705
- Vuln IDs
-
- V-240841
- V-90113
- Rule IDs
-
- SV-240841r674267_rule
- SV-100763
Checks: C-44074r674265_chk
At the command prompt, execute the following command: grep session-timeout /etc/vcac/web.xml If the value of <session-timeout> is not "30" or is missing, this is a finding.
Fix: F-44033r674266_fix
Navigate to and open /etc/vcac/web.xml. Navigate to the <session-config> node. Add the <session-timeout>30</session-timeout> node setting to the <session-config> node.
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-002314
- Version
- VRAU-TC-000710
- Vuln IDs
-
- V-240842
- V-90115
- Rule IDs
-
- SV-240842r674440_rule
- SV-100765
Checks: C-44075r674439_chk
Obtain the correct configuration data for the Authentication Source from the ISSO. Open a web browser, and type in the vRA URL. 1. Log on to the Tenant Administration Portal. 2. Click on Administration >> Directories Management. 3. Click on "Policies". 4. Click on the "Policy Set" link. 5. Verify that User Authentication is configured correctly. If the Authentication Source is not configured in accordance with site policy, this is a finding.
Fix: F-44034r674269_fix
Obtain the correct configuration data for the Authentication Source from the ISSO. Open a web browser, and type in the vRA URL. 1. Log on to the Tenant Administration Portal. 2. Click on Administration >> Directories Management. 3. Click on "Policies". 4. Click on the "Policy Set" link. 5. Modify the Authentication Source in accordance with site policy.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- VRAU-TC-000715
- Vuln IDs
-
- V-240843
- V-90117
- Rule IDs
-
- SV-240843r674273_rule
- SV-100767
Checks: C-44076r674271_chk
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. If the value of "scheme" is not set to "https" or is missing, this is a finding.
Fix: F-44035r674272_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. Configure each <Connector> node with the value 'scheme="https"'.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- VRAU-TC-000720
- Vuln IDs
-
- V-240844
- V-90119
- Rule IDs
-
- SV-240844r674276_rule
- SV-100769
Checks: C-44077r674274_chk
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. If the value of "scheme" is not set to "https" or is missing, this is a finding.
Fix: F-44036r674275_fix
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. Configure the <Connector> node with the value 'scheme="https"'.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- VRAU-TC-000740
- Vuln IDs
-
- V-240845
- V-90121
- Rule IDs
-
- SV-240845r674279_rule
- SV-100771
Checks: C-44078r674277_chk
Interview the ISSO. Determine if tc Server ALL is using a logging mechanism that is configured to have a capacity large enough to accommodate logging requirements. If the logging mechanism does not have sufficient capacity, this is a finding.
Fix: F-44037r674278_fix
Configure the web server to use a logging mechanism that is configured to allocate log record storage capacity in accordance with NIST SP 800-92 log record storage requirements.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- VRAU-TC-000750
- Vuln IDs
-
- V-240846
- V-90349
- Rule IDs
-
- SV-240846r674474_rule
- SV-100999
Checks: C-44079r674473_chk
Interview the ISSO. Review the site policy for moving log files from the web server to a permanent repository. Ensure that log files are being moved from the web server in accordance with the site policy. If the site does not have a policy for periodically moving log files to an archive repository or such policy is not being enforced, this is a finding.
Fix: F-44038r674281_fix
Develop and enforce a site procedure for moving log files periodically from the web server to a permanent repository in accordance with site retention policies.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- VRAU-TC-000755
- Vuln IDs
-
- V-240847
- V-90123
- Rule IDs
-
- SV-240847r674442_rule
- SV-100773
Checks: C-44080r674441_chk
Interview the ISSO. Review site documentation and system configuration. Determine if the system has a logging mechanism that will provide a warning to the ISSO and SA when allocated record storage volume reaches 75% of maximum log record storage capacity. If such an alert mechanism is not in use, this is a finding.
Fix: F-44039r674284_fix
Configure the tc Server ALL logging mechanism to alert the ISSO / SA when the logs have reached 75% of storage capacity.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001890
- Version
- VRAU-TC-000760
- Vuln IDs
-
- V-240848
- V-90125
- Rule IDs
-
- SV-240848r674444_rule
- SV-100775
Checks: C-44081r674443_chk
At the command prompt, execute the following command: tail /storage/log/vmware/horizon/localhost_access_log.YYYY-MM-dd.txt If the timestamp does not contain a time zone mapping, this is a finding. Note: Substitute the actual date in the file name. Note: In Common Log Format, a timestamp will look like [06/Feb/2016:23:12:57 +0000]. The +0000 part is the time zone mapping.
Fix: F-44040r674287_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to the <Valve className="org.apache.catalina.valves.AccessLogValve"> node. Set the "pattern" setting with "%h %l %u %t "%r" %s %b". Note: The <Valve> node should be configured per the following: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001890
- Version
- VRAU-TC-000765
- Vuln IDs
-
- V-240849
- V-90127
- Rule IDs
-
- SV-240849r674446_rule
- SV-100777
Checks: C-44082r674445_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vco/app-server/localhost_access_log.txt If the timestamp does not contain a time zone mapping, this is a finding. Note: In Common Log Format, a timestamp will look like [06/Feb/2016:23:12:57 +0000]. The +0000 part is the time zone mapping.
Fix: F-44041r674290_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to the <Valve className="org.apache.catalina.valves.AccessLogValve"> node. Set the "pattern" setting with "%h %l %u %t "%r" %s %b". Note: The <Valve> node should be configured per the following: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001890
- Version
- VRAU-TC-000770
- Vuln IDs
-
- V-240850
- V-90129
- Rule IDs
-
- SV-240850r674448_rule
- SV-100779
Checks: C-44083r674447_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vcac/access_log.YYYY-MM-dd.txt If the timestamp does not contain a time zone mapping, this is a finding. Note: Substitute the actual date in the file name. Note: In Common Log Format, a timestamp will look like [06/Feb/2016:23:12:57 +0000]. The +0000 part is the time zone mapping.
Fix: F-44042r674293_fix
Navigate to and open /etc/vcac/server.xml. Navigate to the <Valve className="org.apache.catalina.valves.AccessLogValve"> node. Set the "pattern" setting with "%h %l %u %t "%r" %s %b". Note: The <Valve> node should be configured per the following: <Valve className="org.apache.catalina.valves.AccessLogValve" checkExists="true" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="access_log" requestAttributesEnabled="true" rotatable="false" suffix=".txt"/>
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001889
- Version
- VRAU-TC-000775
- Vuln IDs
-
- V-240851
- V-90131
- Rule IDs
-
- SV-240851r674450_rule
- SV-100781
Checks: C-44084r674449_chk
At the command prompt, execute the following command: tail /storage/log/vmware/horizon/localhost_access_log.YYYY-MM-dd.txt If the timestamp does not contain a minimum granularity of one second, this is a finding. Note: Substitute the actual date in the file name. Note: In Common Log Format, a timestamp will look like [06/Feb/2016:23:12:57 +0000]. The "57" part is the "seconds" part of the timestamp.
Fix: F-44043r674296_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to the <Valve className="org.apache.catalina.valves.AccessLogValve"> node. Set the 'pattern' setting with "%h %l %u %t "%r" %s %b". Note: The <Valve> node should be configured per the following: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001889
- Version
- VRAU-TC-000780
- Vuln IDs
-
- V-240852
- V-90133
- Rule IDs
-
- SV-240852r674452_rule
- SV-100783
Checks: C-44085r674451_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vco/app-server/localhost_access_log.txt If the timestamp does not contain a minimum granularity of one second, this is a finding. Note: In Common Log Format, a timestamp will look like [06/Feb/2016:23:12:57 +0000]. The "57" part is the "seconds" part of the timestamp.
Fix: F-44044r674299_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to the <Valve className="org.apache.catalina.valves.AccessLogValve"> node. Set the "pattern" setting with "%h %l %u %t "%r" %s %b". Note: The <Valve> node should be configured per the following: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001889
- Version
- VRAU-TC-000785
- Vuln IDs
-
- V-240853
- V-90135
- Rule IDs
-
- SV-240853r674454_rule
- SV-100785
Checks: C-44086r674453_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vcac/access_log.YYYY-MM-dd.txt If the timestamp does not contain a minimum granularity of one second, this is a finding. Note: Substitute the actual date in the file name. Note: In Common Log Format, a timestamp will look like [06/Feb/2016:23:12:57 +0000]. The "57" part is the "seconds" part of the timestamp.
Fix: F-44045r674302_fix
Navigate to and open /etc/vcac/server.xml. Navigate to the <Valve className="org.apache.catalina.valves.AccessLogValve"> node. Set the "pattern" setting with "%h %l %u %t "%r" %s %b". Note: The <Valve> node should be configured per the following: <Valve className="org.apache.catalina.valves.AccessLogValve" checkExists="true" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="access_log" requestAttributesEnabled="true" rotatable="false" suffix=".txt"/>
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- VRAU-TC-000790
- Vuln IDs
-
- V-240854
- V-90137
- Rule IDs
-
- SV-240854r674306_rule
- SV-100787
Checks: C-44087r674304_chk
At the command prompt, execute the following command: ls -alR /opt/vmware/horizon/workspace /opt/vmware/horizon/workspace/webapps | grep -E '^-' | awk '$1 !~ /---$/ {print}' If the command produces any output, this is a finding.
Fix: F-44046r674305_fix
Remove all world permissions from any listed file with the following command: chmod -R o-rwx /opt/vmware/horizon/workspace /opt/vmware/horizon/workspace/webapps
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- VRAU-TC-000795
- Vuln IDs
-
- V-240855
- V-90139
- Rule IDs
-
- SV-240855r674309_rule
- SV-100789
Checks: C-44088r674307_chk
At the command prompt, execute the following command: ls -alR /usr/lib/vco/configuration/webapps | grep -E '^-' | awk '$1 !~ /---$/ {print}' If the command produces any output, this is a finding.
Fix: F-44047r674308_fix
Remove all world permissions from any listed file with the following command: chmod -R o-rwx /usr/lib/vco/configuration/webapps
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- VRAU-TC-000800
- Vuln IDs
-
- V-240856
- V-90141
- Rule IDs
-
- SV-240856r674312_rule
- SV-100791
Checks: C-44089r674310_chk
At the command prompt, execute the following commands: ls -alR /etc/vcac /usr/lib/vcac/server/webapps | grep -E '^-' | awk '$1 !~ /---$/ {print}' If the command produces any output, this is a finding.
Fix: F-44048r674311_fix
Remove all world permissions from any listed file with the following command: chmod -R o-rwx /etc/vcac /usr/lib/vcac/server/webapps
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- VRAU-TC-000805
- Vuln IDs
-
- V-240857
- V-90143
- Rule IDs
-
- SV-240857r674456_rule
- SV-100793
Checks: C-44090r674455_chk
At the command prompt, execute the following command: cat /opt/vmware/horizon/workspace/conf/catalina.properties | grep -E '\.port' Review the listed ports. Verify that they match the list below of tc Server HORIZON ports. base.shutdown.port=-1 base.jmx.port=6969 bio-ssl.https.port=6443 If the displayed ports do not match the above list of ports, this is a finding.
Fix: F-44049r674314_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/catalina.properties. Navigate to the ports specification section. Set the tc Server HORIZON port specifications according to the list below: base.shutdown.port=-1 base.jmx.port=6969 bio-ssl.https.port=6443
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- VRAU-TC-000810
- Vuln IDs
-
- V-240858
- V-90145
- Rule IDs
-
- SV-240858r674458_rule
- SV-100795
Checks: C-44091r674457_chk
At the command prompt, execute the following command: cat /etc/vco/app-server/catalina.properties | grep -E '\.port' Review the listed ports. Verify that they match the list below of tc Server VCO ports. ch.dunes.http-server.port=8280 ch.dunes.https-server.port=8281 If the displayed ports do not match the above list of ports, this is a finding.
Fix: F-44050r674317_fix
Navigate to and open /etc/vco/app-server/catalina.properties. Navigate to the ports specification section. Set the tc Server VCO port specifications according to the list below: ch.dunes.http-server.port=8280 ch.dunes.https-server.port=8281
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- VRAU-TC-000815
- Vuln IDs
-
- V-240859
- V-90147
- Rule IDs
-
- SV-240859r674460_rule
- SV-100797
Checks: C-44092r674459_chk
At the command prompt, execute the following command: cat /etc/vcac/catalina.properties | grep -E '\.port' Review the listed ports. Verify that they match the list below of tc Server VCAC ports. base.shutdown.port=-1 base.jmx.port=6969 ajp.http.port=8009 ajp.https.port=8443 If the displayed ports do not match the above list of ports, this is a finding.
Fix: F-44051r674320_fix
Navigate to and open /etc/vcac/catalina.properties. Navigate to the ports specification section. Set the tc Server VCAC port specifications according to the list below: base.shutdown.port=-1 base.jmx.port=6969 ajp.http.port=8009 ajp.https.port=8443
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- VRAU-TC-000820
- Vuln IDs
-
- V-240860
- V-90149
- Rule IDs
-
- SV-240860r674462_rule
- SV-100799
Checks: C-44093r674461_chk
If the system is not implemented to process compartmentalized information, this requirement is Not Applicable. At the command prompt, execute the following command: grep bio-ssl.cipher.list /opt/vmware/horizon/workspace/conf/catalina.properties If the value of "bio-ssl.cipher.list" does not match the list of NSA Suite A ciphers or is missing, this is a finding.
Fix: F-44052r674323_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/catalina.properties. Navigate to the "bio-ssl.cipher.list" setting. Configure "bio-ssl.cipher.list" with a list of NSA Suite A ciphers.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- VRAU-TC-000825
- Vuln IDs
-
- V-240861
- V-90151
- Rule IDs
-
- SV-240861r674464_rule
- SV-100801
Checks: C-44094r674463_chk
If the system is not implemented to process compartmentalized information, this requirement is Not Applicable. At the command prompt, execute the following command: grep cipher /etc/vcac/catalina.properties If the value of "cipher" does not match the list of NSA Suite A ciphers or is missing, this is a finding.
Fix: F-44053r674326_fix
Navigate to and open /etc/vcac/catalina.properties. Navigate to and locate "cipher". Configure the "cipher" with NSA Suite A ciphers.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- VRAU-TC-000840
- Vuln IDs
-
- V-240862
- V-90153
- Rule IDs
-
- SV-240862r674330_rule
- SV-100803
Checks: C-44095r674328_chk
At the command prompt, execute the following command: grep base.shutdown.port /opt/vmware/horizon/workspace/conf/catalina.properties If the value of "base.shutdown.port" is not set to "-1" or is missing, this is a finding.
Fix: F-44054r674329_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/catalina.properties. Navigate to the "base.shutdown.port" setting. Add the setting "base.shutdown.port=-1" to the "catalina.properties" file.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- VRAU-TC-000845
- Vuln IDs
-
- V-240863
- V-90155
- Rule IDs
-
- SV-240863r674333_rule
- SV-100805
Checks: C-44096r674331_chk
At the command prompt, execute the following command: grep shutdown /etc/vco/app-server/server.xml If the value of "shutdown" is not set to "-1" or is missing, this is a finding.
Fix: F-44055r674332_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to the <Server> node. Add the attribute 'port="-1"' to the <Server> node in the "server.xml" file.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- VRAU-TC-000850
- Vuln IDs
-
- V-240864
- V-90157
- Rule IDs
-
- SV-240864r674336_rule
- SV-100807
Checks: C-44097r674334_chk
At the command prompt, execute the following command: grep base.shutdown.port /etc/vcac/catalina.properties If the value of "base.shutdown.port" is not set to "-1" or is missing, this is a finding.
Fix: F-44056r674335_fix
Navigate to and open /etc/vcac/catalina.properties. Navigate to the "base.shutdown.port" setting. Add the setting "base.shutdown.port=-1" to the "catalina.properties" file.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- VRAU-TC-000860
- Vuln IDs
-
- V-240865
- V-90159
- Rule IDs
-
- SV-240865r674339_rule
- SV-100809
Checks: C-44098r674337_chk
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml Navigate to each of the <Connector> nodes. If the value of "sslProtocol" is not set to "TLS" or is missing, this is a finding.
Fix: F-44057r674338_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. Note: There are three <Connector> nodes. Configure each <Connector> nodes with the setting 'sslProtocol="TLS"'.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- VRAU-TC-000865
- Vuln IDs
-
- V-240866
- V-90161
- Rule IDs
-
- SV-240866r674342_rule
- SV-100811
Checks: C-44099r674340_chk
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. If the value of "sslProtocol" is not set to "TLS" or is missing, this is a finding.
Fix: F-44058r674341_fix
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. Configure the <Connector> node with the setting 'sslProtocol="TLS"'.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- VRAU-TC-000870
- Vuln IDs
-
- V-240867
- V-90163
- Rule IDs
-
- SV-240867r674345_rule
- SV-100813
Checks: C-44100r674343_chk
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. If the value of "sslProtocol" is not set to "TLS" or is missing, this is a finding.
Fix: F-44059r674344_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. Note: There are three <Connector> nodes. Configure each <Connector> nodes with the setting 'sslProtocol="TLS"'.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- VRAU-TC-000875
- Vuln IDs
-
- V-240868
- V-90165
- Rule IDs
-
- SV-240868r674348_rule
- SV-100815
Checks: C-44101r674346_chk
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. If the value of "sslProtocol" is not set to "TLS" or is missing, this is a finding.
Fix: F-44060r674347_fix
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. Configure the <Connector> node with the setting 'sslProtocol="TLS"'.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- VRAU-TC-000885
- Vuln IDs
-
- V-240869
- V-90167
- Rule IDs
-
- SV-240869r674351_rule
- SV-100817
Checks: C-44102r674349_chk
At the command prompt, execute the following command: grep useHttpOnly /opt/vmware/horizon/workspace/conf/context.xml If the value of "useHttpOnly" is not set to "true" or is missing, this is a finding.
Fix: F-44061r674350_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/context.xml. Navigate to the <Context> node. Add the 'useHttpOnly="true"' setting to the <Context> node. Note: The <Context> node should be configured per the following: <Context useHttpOnly="true">
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- VRAU-TC-000890
- Vuln IDs
-
- V-240870
- V-90169
- Rule IDs
-
- SV-240870r674354_rule
- SV-100819
Checks: C-44103r674352_chk
At the command prompt, execute the following command: grep useHttpOnly /etc/vco/app-server/context.xml If the value of "useHttpOnly" is not set to "true" or is missing, this is a finding.
Fix: F-44062r674353_fix
Navigate to and open /etc/vco/app-server/context.xml. Navigate to the <Context> node. Add the 'useHttpOnly="true"' setting to the <Context> node. Note: The <Context> node should be configured per the following: <Context useHttpOnly="true">
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- VRAU-TC-000895
- Vuln IDs
-
- V-240871
- V-90171
- Rule IDs
-
- SV-240871r674357_rule
- SV-100821
Checks: C-44104r674355_chk
At the command prompt, execute the following command: grep useHttpOnly /etc/vcac/context.xml If the value of "useHttpOnly" is not set to "true" or is missing, this is a finding.
Fix: F-44063r674356_fix
Navigate to and open /etc/vcac/context.xml. Navigate to the <Context> node. Add the 'useHttpOnly="true"' setting to the <Context> node. Note: The <Context> node should be configured per the following: <Context useHttpOnly="true">
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- VRAU-TC-000900
- Vuln IDs
-
- V-240872
- V-90173
- Rule IDs
-
- SV-240872r674360_rule
- SV-100823
Checks: C-44105r674358_chk
At the command prompt, execute the following command: grep -E '<secure>' /opt/vmware/horizon/workspace/conf/web.xml If the value of the <secure> node is not set to "true" or is missing, this is a finding.
Fix: F-44064r674359_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/web.xml. Navigate to the <session-config> node. Add the <cookie-config> --> <secure> node setting to the <session-config> node. Note: The <cookie-config> --> <secure> node should be configured per the following: <cookie-config> <secure>true</secure> </cookie-config>
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- VRAU-TC-000905
- Vuln IDs
-
- V-240873
- V-90175
- Rule IDs
-
- SV-240873r674363_rule
- SV-100825
Checks: C-44106r674361_chk
At the command prompt, execute the following command: grep -E '<secure>' /etc/vco/app-server/web.xml If the value of the <secure> node is not set to "true" or is missing, this is a finding.
Fix: F-44065r674362_fix
Navigate to and open /etc/vco/app-server/web.xml. Navigate to the <session-config> node. Add the <cookie-config> --> <secure> node setting to the <session-config> node. Note: The <cookie-config> --> <secure> node should be configured per the following: <cookie-config> <secure>true</secure> </cookie-config>
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- VRAU-TC-000910
- Vuln IDs
-
- V-240874
- V-90177
- Rule IDs
-
- SV-240874r674366_rule
- SV-100827
Checks: C-44107r674364_chk
At the command prompt, execute the following command: grep -E '<secure>' /etc/vcac/web.xml If the value of the <secure> node is not set to "true" or is missing, this is a finding.
Fix: F-44066r674365_fix
Navigate to and open /etc/vcac/web.xml. Navigate to the <session-config> node. Add the <cookie-config> --> <secure> node setting to the <session-config> node. Note: The <cookie-config> --> <secure> node should be configured per the following: <cookie-config> <secure>true</secure> </cookie-config>
- RMF Control
- SC-8
- Severity
- H
- CCI
- CCI-002418
- Version
- VRAU-TC-000915
- Vuln IDs
-
- V-240875
- V-90179
- Rule IDs
-
- SV-240875r674369_rule
- SV-100829
Checks: C-44108r674367_chk
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. If the value of "sslEnabledProtocols" is not set to "TLSv1.2,TLSv1.1,TLSv1" or is missing, this is a finding.
Fix: F-44067r674368_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. Note: There are three <Connector> nodes. Configure each <Connector> node with the setting 'sslEnabledProtocols="TLSv1.2,TLSv1.1,TLSv1"'.
- RMF Control
- SC-8
- Severity
- H
- CCI
- CCI-002418
- Version
- VRAU-TC-000920
- Vuln IDs
-
- V-240876
- V-90181
- Rule IDs
-
- SV-240876r674372_rule
- SV-100831
Checks: C-44109r674370_chk
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. If the value of "sslEnabledProtocols" is not set to "TLSv1.2,TLSv1.1,TLSv1" or is missing, this is a finding.
Fix: F-44068r674371_fix
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. Configure the <Connector> node with the setting 'sslEnabledProtocols="TLSv1.2,TLSv1.1,TLSv1"'.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- VRAU-TC-000925
- Vuln IDs
-
- V-240877
- V-90183
- Rule IDs
-
- SV-240877r674375_rule
- SV-100833
Checks: C-44110r674373_chk
At the command prompt, execute the following command: grep bio-ssl.cipher.list /opt/vmware/horizon/workspace/conf/catalina.properties If any export ciphers are listed, this is a finding.
Fix: F-44069r674374_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/catalina.properties. Navigate to the "bio-ssl.cipher.list" setting. Remove any export ciphers from "bio-ssl.cipher.list". Note: To view a list of export ciphers, at the command prompt execute the following command: openssl ciphers 'EXP'
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- VRAU-TC-000930
- Vuln IDs
-
- V-240878
- V-90185
- Rule IDs
-
- SV-240878r674378_rule
- SV-100835
Checks: C-44111r674376_chk
At the command prompt, execute the following command: grep ciphers /etc/vcac/catalina.properties If any export ciphers are listed, this is a finding.
Fix: F-44070r674377_fix
Navigate to and open /etc/vcac/catalina.properties. Navigate to the "cipher" setting. Remove any export ciphers from "cipher". Note: To view a list of export ciphers, at the command prompt execute the following command: openssl ciphers 'EXP'
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002422
- Version
- VRAU-TC-000940
- Vuln IDs
-
- V-240879
- V-90187
- Rule IDs
-
- SV-240879r674381_rule
- SV-100837
Checks: C-44112r674379_chk
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. If the value of "sslEnabledProtocols" is not set to "TLSv1.2,TLSv1.1,TLSv1" or is missing, this is a finding.
Fix: F-44071r674380_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. Note: There are three <Connector> nodes. Configure each <Connector> node with the setting 'sslEnabledProtocols="TLSv1.2,TLSv1.1,TLSv1"'.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002422
- Version
- VRAU-TC-000945
- Vuln IDs
-
- V-240880
- V-90189
- Rule IDs
-
- SV-240880r674384_rule
- SV-100839
Checks: C-44113r674382_chk
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. If the value of "sslEnabledProtocols" is not set to "TLSv1.2,TLSv1.1,TLSv1" or is missing, this is a finding.
Fix: F-44072r674383_fix
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. Configure the <Connector> node with the setting 'sslEnabledProtocols="TLSv1.2,TLSv1.1,TLSv1"'.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- VRAU-TC-000950
- Vuln IDs
-
- V-240881
- V-90191
- Rule IDs
-
- SV-240881r674466_rule
- SV-100841
Checks: C-44114r674465_chk
Interview the ISSO. Review the policies and procedures used to ensure that all security-related upgrades are being installed within the configured time period directed by an authoritative source. If all security-related upgrades are not being installed within the configured time period directed by an authoritative source, this is a finding.
Fix: F-44073r674386_fix
Ensure that patches and updates from an authoritative source are applied at least within 24 hours after they have been received.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- VRAU-TC-000960
- Vuln IDs
-
- V-240882
- V-90193
- Rule IDs
-
- SV-240882r674468_rule
- SV-100843
Checks: C-44115r674467_chk
Interview the ISSO. Verify that this Security Technical Implementation Guide (STIG) is the most current STIG available for tc Server on vRA. Assess all of the organization's vRA installations to ensure that they are fully compliant with the most current tc Server STIG. If the most current version of the tc Server was not used, or if the tc Server configuration is not compliant with the most current tc Server STIG, this is a finding.
Fix: F-44074r674389_fix
Obtain the most current tc Server ALL STIG. Verify that tc Server ALL is configured with all current requirements.