VMware vRealize Automation 7.x tc Server Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +1
Comparison against the immediately-prior release (V2R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 1
- V-258454 High The version of vRealize Automation 7.x tc Server running on the system must be a supported version.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VRAU-TC-000005
- Vuln IDs
-
- V-240725
- V-90341
- Rule IDs
-
- SV-240725r879511_rule
- SV-100991
Checks: C-43958r673917_chk
At the command prompt, execute the following command: grep maxThreads /opt/vmware/horizon/workspace/conf/server.xml If the value of "maxThreads" is not "300" or is missing, this is a finding.
Fix: F-43917r673918_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to and locate <Executor>. Configure the <Executor> with the value 'maxThreads="300"'. Note: The <Executor> node should be configured per the following: <Executor maxThreads="300" minSpareThreads="50" name="tomcatThreadPool" namePrefix="tomcat-http--"/>
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VRAU-TC-000010
- Vuln IDs
-
- V-240726
- V-89883
- Rule IDs
-
- SV-240726r879511_rule
- SV-100533
Checks: C-43959r673920_chk
At the command prompt, execute the following command: grep maxThreads /etc/vco/app-server/server.xml If the value of "maxThreads" is not "300" or is missing, this is a finding.
Fix: F-43918r673921_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to and locate the <Connector> node. Configure the <Connector> with the value 'maxThreads="300"'.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VRAU-TC-000015
- Vuln IDs
-
- V-240727
- V-89885
- Rule IDs
-
- SV-240727r879511_rule
- SV-100535
Checks: C-43960r673923_chk
At the command prompt, execute the following command: grep maxThreads /etc/vcac/server.xml If the value of "maxThreads" is not "1000" or is missing, this is a finding.
Fix: F-43919r673924_fix
Navigate to and open /etc/vcac/server.xml. Navigate to and locate <Executor>. Configure the <Executor> with the value 'maxThreads="1000"'. Note: The <Executor> node should be configured per the following: <Executor maxThreads="1000" minSpareThreads="50" name="tomcatThreadPool" namePrefix="tomcat-http--"/>
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VRAU-TC-000020
- Vuln IDs
-
- V-240728
- V-89887
- Rule IDs
-
- SV-240728r879511_rule
- SV-100537
Checks: C-43961r673926_chk
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. If the value of "connectionTimeout" is not set to "20000" or is missing, this is a finding.
Fix: F-43920r673927_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. Configure each <Connector> node with the value 'connectionTimeout="20000"'.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VRAU-TC-000025
- Vuln IDs
-
- V-240729
- V-89889
- Rule IDs
-
- SV-240729r879511_rule
- SV-100539
Checks: C-43962r673929_chk
Navigate to and open /etc/vco/app-server/server.xml. Navigate to the <Connector> node. If the value of "connectionTimeout" is not set to "20000" or is missing, this is a finding.
Fix: F-43921r673930_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to the <Connector> node. Configure the <Connector> node with the value 'connectionTimeout="10000"'.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VRAU-TC-000030
- Vuln IDs
-
- V-240730
- V-89891
- Rule IDs
-
- SV-240730r879511_rule
- SV-100541
Checks: C-43963r673932_chk
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. If the value of "connectionTimeout" is not set to "10000" or is missing, this is a finding.
Fix: F-43922r673933_fix
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. Configure the <Connector> node with the value 'connectionTimeout="10000"'.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VRAU-TC-000035
- Vuln IDs
-
- V-240731
- V-89893
- Rule IDs
-
- SV-240731r879511_rule
- SV-100543
Checks: C-43964r673935_chk
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. If the value of "maxKeepAliveRequests" is not set to "15" or is missing, this is a finding.
Fix: F-43923r673936_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. Configure each <Connector> node with the value 'maxKeepAliveRequests="15"'.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VRAU-TC-000040
- Vuln IDs
-
- V-240732
- V-89895
- Rule IDs
-
- SV-240732r879511_rule
- SV-100545
Checks: C-43965r673938_chk
Navigate to and open /etc/vco/app-server/server.xml. Navigate to the <Connector> node. If the value of "maxKeepAliveRequests" is not set to "15" or is missing, this is a finding.
Fix: F-43924r673939_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to the <Connector> node. Configure the <Connector> node with the value 'maxKeepAliveRequests="15"'.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VRAU-TC-000045
- Vuln IDs
-
- V-240733
- V-89897
- Rule IDs
-
- SV-240733r879511_rule
- SV-100547
Checks: C-43966r673941_chk
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. If the value of "maxKeepAliveRequests" is not set to "15" or is missing, this is a finding.
Fix: F-43925r673942_fix
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. Configure the <Connector> node with the value 'maxKeepAliveRequests="15"'.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VRAU-TC-000050
- Vuln IDs
-
- V-240734
- V-89899
- Rule IDs
-
- SV-240734r879511_rule
- SV-100549
Checks: C-43967r673944_chk
At the command prompt, execute the following command: grep -E 'cookies=.false' /opt/vmware/horizon/workspace/conf/context.xml If the command produces any output, this is a finding.
Fix: F-43926r673945_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/context.xml. Navigate to and locate the <Context> node. Remove the value 'cookies="false"' from the <Context> node.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VRAU-TC-000055
- Vuln IDs
-
- V-240735
- V-89901
- Rule IDs
-
- SV-240735r879511_rule
- SV-100551
Checks: C-43968r673947_chk
At the command prompt, execute the following command: grep -E 'cookies=.false' /etc/vco/app-server/context.xml If the command produces any output, this is a finding.
Fix: F-43927r673948_fix
Navigate to and open /etc/vco/app-server/context.xml. Navigate to and locate the <Context> node. Remove the value 'cookies="false"' from the <Context> node.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VRAU-TC-000060
- Vuln IDs
-
- V-240736
- V-89903
- Rule IDs
-
- SV-240736r879511_rule
- SV-100553
Checks: C-43969r673950_chk
At the command prompt, execute the following command: grep -E 'cookies=.false' /etc/vcac/context.xml If the command produces any output, this is a finding.
Fix: F-43928r673951_fix
Navigate to and open /etc/vcac/context.xml. Navigate to and locate the <Context> node. Remove the value 'cookies="false"' from the <Context> node.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- VRAU-TC-000065
- Vuln IDs
-
- V-240737
- V-89905
- Rule IDs
-
- SV-240737r879519_rule
- SV-100555
Checks: C-43970r674391_chk
At the command prompt, execute the following command: grep bio-ssl.cipher.list /opt/vmware/horizon/workspace/conf/catalina.properties If the value of "bio-ssl.cipher.list" does not match the list of FIPS 140-2 ciphers or is missing, this is a finding. Note: To view a list of FIPS 140-2 ciphers, at the command prompt execute the following command: openssl ciphers 'FIPS'
Fix: F-43929r673954_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/catalina.properties. Navigate to and locate "bio-ssl.cipher.list". Configure the "bio-ssl.cipher.list" with FIPS 140-2 compliant ciphers.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- VRAU-TC-000070
- Vuln IDs
-
- V-240738
- V-89907
- Rule IDs
-
- SV-240738r879519_rule
- SV-100557
Checks: C-43971r674393_chk
At the command prompt, execute the following command: grep cipher /etc/vcac/catalina.properties If the value of "cipher" does not match the list of FIPS 140-2 ciphers or is missing, this is a finding. Note: To view a list of FIPS 140-2 ciphers, at the command prompt execute the following command: openssl ciphers 'FIPS'
Fix: F-43930r673957_fix
Navigate to and open /etc/vcac/catalina.properties. Navigate to and locate "cipher". Configure the "cipher" with FIPS 140-2 compliant ciphers.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- VRAU-TC-000075
- Vuln IDs
-
- V-240739
- V-89909
- Rule IDs
-
- SV-240739r879520_rule
- SV-100559
Checks: C-43972r673959_chk
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. If the value of "SSLEnabled" is not set to "true" or is missing, this is a finding.
Fix: F-43931r673960_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. Configure each <Connector> node with the value 'SSLEnabled="true"'.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- VRAU-TC-000080
- Vuln IDs
-
- V-240740
- V-90343
- Rule IDs
-
- SV-240740r879520_rule
- SV-100993
Checks: C-43973r673962_chk
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. If the value of "SSLEnabled" is not set to "true" or is missing, this is a finding.
Fix: F-43932r673963_fix
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. Configure the <Connector> node with the value 'SSLEnabled="true"'.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- VRAU-TC-000085
- Vuln IDs
-
- V-240741
- V-89911
- Rule IDs
-
- SV-240741r879521_rule
- SV-100561
Checks: C-43974r674395_chk
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to the <Host> node. Verify that the node contains a <Valve className="org.apache.catalina.valves.AccessLogValve"> node. If an "AccessLogValve" is not configured correctly or is missing, this is a finding. Note: The AccessLogValve should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t &quot;%r&quot; %s %b" prefix="access_log" suffix=".txt" rotatable="false" requestAttributesEnabled="true" checkExists="true"/>
Fix: F-43933r673966_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The AccessLogValve should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- VRAU-TC-000090
- Vuln IDs
-
- V-240742
- V-89913
- Rule IDs
-
- SV-240742r879521_rule
- SV-100563
Checks: C-43975r674397_chk
Navigate to and open /etc/vco/app-server/server.xml. Navigate to the <Host> node. Verify that the node contains a <Valve className="org.apache.catalina.valves.AccessLogValve"> node. If an "AccessLogValve" is not configured correctly or is missing, this is a finding. Note: The AccessLogValve should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" prefix="localhost_access_log" suffix=".txt" pattern="%h %l %u %t &quot;%r&quot; %s %b" rotatable="false" checkExists="true"/>
Fix: F-43934r673969_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The AccessLogValve should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- VRAU-TC-000095
- Vuln IDs
-
- V-240743
- V-89915
- Rule IDs
-
- SV-240743r879521_rule
- SV-100565
Checks: C-43976r674399_chk
Navigate to and open /etc/vcac/server.xml. Navigate to the <Host> node. Verify that the node contains a <Valve className="org.apache.catalina.valves.AccessLogValve"> node. If an "AccessLogValve" is not configured correctly or is missing, this is a finding. Note: The AccessLogValve should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" checkExists="true" directory="logs" pattern="%h %l %u %t &quot;%r&quot; %s %b" prefix="access_log" requestAttributesEnabled="true" rotatable="false" suffix=".txt"/>
Fix: F-43935r673972_fix
Navigate to and open /etc/vcac/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The AccessLogValve should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" checkExists="true" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="access_log" requestAttributesEnabled="true" rotatable="false" suffix=".txt"/>
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- VRAU-TC-000105
- Vuln IDs
-
- V-240744
- V-89917
- Rule IDs
-
- SV-240744r879559_rule
- SV-100567
Checks: C-43977r674401_chk
At the command prompt, execute the following command: more /storage/log/vmware/vco/app-server/catalina.out Verify that tc Server start and stop events are being logged. If the tc Server start and stop events are not being recorded, this is a finding. Note: The tc Server service is referred to as Catalina in the log.
Fix: F-43936r673975_fix
Navigate to and open /usr/share/tomcat/bin/catalina.sh. Navigate to and locate the start block : "elif [ "$1" = "start" ] ; then" Navigate to and locate both "eval" statements : "org.apache.catalina.startup.Bootstrap "$@" start \" Add this statement immediately below both of the "eval" statements : '>> "$CATALINA_OUT" 2>&1 "&"'
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- VRAU-TC-000110
- Vuln IDs
-
- V-240745
- V-89919
- Rule IDs
-
- SV-240745r879559_rule
- SV-100569
Checks: C-43978r674403_chk
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to the <Host> node. Verify that the node contains a <Valve className="org.apache.catalina.valves.AccessLogValve"> node. If an "AccessLogValve" is not configured correctly or is missing, this is a finding. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t &quot;%r&quot; %s %b" prefix="access_log" suffix=".txt" rotatable="false" requestAttributesEnabled="true" checkExists="true"/>
Fix: F-43937r673978_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- VRAU-TC-000115
- Vuln IDs
-
- V-240746
- V-89921
- Rule IDs
-
- SV-240746r879559_rule
- SV-100571
Checks: C-43979r674405_chk
Navigate to and open /etc/vco/app-server/server.xml. Navigate to the <Host> node. Verify that the node contains a <Valve className="org.apache.catalina.valves.AccessLogValve"> node. If an "AccessLogValve" is not configured correctly or is missing, this is a finding. Note: The AccessLogValve should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" prefix="localhost_access_log" suffix=".txt" pattern="%h %l %u %t &quot;%r&quot; %s %b" rotatable="false" checkExists="true"/>
Fix: F-43938r673981_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- VRAU-TC-000120
- Vuln IDs
-
- V-240747
- V-89923
- Rule IDs
-
- SV-240747r879559_rule
- SV-100573
Checks: C-43980r674407_chk
Navigate to and open /etc/vcac/server.xml. Navigate to the <Host> node. Verify that the node contains a <Valve className="org.apache.catalina.valves.AccessLogValve"> node. If an "AccessLogValve" is not configured correctly or is missing, this is a finding. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" checkExists="true" directory="logs" pattern="%h %l %u %t &quot;%r&quot; %s %b" prefix="access_log" requestAttributesEnabled="true" rotatable="false" suffix=".txt"/>
Fix: F-43939r673984_fix
Navigate to and open /etc/vcac/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" checkExists="true" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="access_log" requestAttributesEnabled="true" rotatable="false" suffix=".txt"/>
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001464
- Version
- VRAU-TC-000125
- Vuln IDs
-
- V-240748
- V-89925
- Rule IDs
-
- SV-240748r879562_rule
- SV-100575
Checks: C-43981r674409_chk
At the command prompt, execute the following command: more /usr/share/tomcat/bin/catalina.sh Type /touch "$CATALINA_OUT" Verify that the start command contains the command ">> "$CATALINA_OUT" 2>&1 "&"" If the command is not correct or is missing, this is a finding. Note: Use the "Enter" key to scroll down after typing /touch "$CATALINA_OUT"
Fix: F-43940r673987_fix
Navigate to and open Navigate to and open /usr/share/tomcat/bin/catalina.sh. Navigate to and locate the start block : "elif [ "$1" = "start" ] ; then" Navigate to and locate both "eval" statements : "org.apache.catalina.startup.Bootstrap "$@" start \" Add this statement immediately below both of the "eval" statements : '>> "$CATALINA_OUT" 2>&1 "&"'
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- VRAU-TC-000145
- Vuln IDs
-
- V-240749
- V-89933
- Rule IDs
-
- SV-240749r879563_rule
- SV-100583
Checks: C-43982r673989_chk
At the command prompt, execute the following command: tail /storage/log/vmware/horizon/localhost_access_log.YYYY-MM-dd.txt Note: Substitute the actual date in the file name. If HTTP "GET" and/or "POST" events are not being recorded, this is a finding.
Fix: F-43941r673990_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- VRAU-TC-000150
- Vuln IDs
-
- V-240750
- V-89935
- Rule IDs
-
- SV-240750r879563_rule
- SV-100585
Checks: C-43983r673992_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vco/app-server/localhost_access_log.txt If HTTP "GET" and/or "POST" events are not being recorded, this is a finding.
Fix: F-43942r673993_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- VRAU-TC-000155
- Vuln IDs
-
- V-240751
- V-89937
- Rule IDs
-
- SV-240751r879563_rule
- SV-100587
Checks: C-43984r673995_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vcac/access_log.YYYY-MM-dd.txt Note: Substitute the actual date in the file name. If HTTP "GET" and/or "POST" events are not being recorded, this is a finding.
Fix: F-43943r673996_fix
Navigate to and open /etc/vcac/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" checkExists="true" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="access_log" requestAttributesEnabled="true" rotatable="false" suffix=".txt"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- VRAU-TC-000160
- Vuln IDs
-
- V-240752
- V-89939
- Rule IDs
-
- SV-240752r879564_rule
- SV-100589
Checks: C-43985r673998_chk
At the command prompt, execute the following command: tail /storage/log/vmware/horizon/localhost_access_log.YYYY-MM-dd.txt Note: Substitute the actual date in the file name. If the time and date of events are not being recorded, this is a finding.
Fix: F-43944r673999_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- VRAU-TC-000165
- Vuln IDs
-
- V-240753
- V-89941
- Rule IDs
-
- SV-240753r879564_rule
- SV-100591
Checks: C-43986r674001_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vco/app-server/localhost_access_log.txt If the time and date of events are not being recorded, this is a finding.
Fix: F-43945r674002_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- VRAU-TC-000170
- Vuln IDs
-
- V-240754
- V-89943
- Rule IDs
-
- SV-240754r879564_rule
- SV-100593
Checks: C-43987r674004_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vcac/access_log.YYYY-MM-dd.txt Note: Substitute the actual date in the file name. If the time and date of events are not being recorded, this is a finding.
Fix: F-43946r674005_fix
Navigate to and open /etc/vcac/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" checkExists="true" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="access_log" requestAttributesEnabled="true" rotatable="false" suffix=".txt"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- VRAU-TC-000175
- Vuln IDs
-
- V-240755
- V-89945
- Rule IDs
-
- SV-240755r879565_rule
- SV-100595
Checks: C-43988r674007_chk
At the command prompt, execute the following command: tail /storage/log/vmware/horizon/localhost_access_log.YYYY-MM-dd.txt Note: Substitute the actual date in the file name. If the location of events are not being recorded, this is a finding.
Fix: F-43947r674008_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- VRAU-TC-000180
- Vuln IDs
-
- V-240756
- V-89947
- Rule IDs
-
- SV-240756r879565_rule
- SV-100597
Checks: C-43989r674010_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vco/app-server/localhost_access_log.txt If the location of events are not being recorded, this is a finding.
Fix: F-43948r674011_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- VRAU-TC-000185
- Vuln IDs
-
- V-240757
- V-89949
- Rule IDs
-
- SV-240757r879565_rule
- SV-100599
Checks: C-43990r674013_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vcac/access_log.YYYY-MM-dd.txt Note: Substitute the actual date in the file name. If the location of events are not being recorded, this is a finding.
Fix: F-43949r674014_fix
Navigate to and open /etc/vcac/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" checkExists="true" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="access_log" requestAttributesEnabled="true" rotatable="false" suffix=".txt"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- VRAU-TC-000190
- Vuln IDs
-
- V-240758
- V-89951
- Rule IDs
-
- SV-240758r879566_rule
- SV-100601
Checks: C-43991r674016_chk
At the command prompt, execute the following command: tail /storage/log/vmware/horizon/localhost_access_log.YYYY-MM-dd.txt Note: Substitute the actual date in the file name. If the source IP of events are not being recorded, this is a finding.
Fix: F-43950r674017_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- VRAU-TC-000195
- Vuln IDs
-
- V-240759
- V-89953
- Rule IDs
-
- SV-240759r879566_rule
- SV-100603
Checks: C-43992r674019_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vco/app-server/localhost_access_log.txt If the source IP of events are not being recorded, this is a finding.
Fix: F-43951r674020_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- VRAU-TC-000200
- Vuln IDs
-
- V-240760
- V-89955
- Rule IDs
-
- SV-240760r879566_rule
- SV-100605
Checks: C-43993r674022_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vcac/access_log.YYYY-MM-dd.txt Note: Substitute the actual date in the file name. If the source IP of events are not being recorded, this is a finding.
Fix: F-43952r674023_fix
Navigate to and open /etc/vcac/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" checkExists="true" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="access_log" requestAttributesEnabled="true" rotatable="false" suffix=".txt"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- VRAU-TC-000205
- Vuln IDs
-
- V-240761
- V-89957
- Rule IDs
-
- SV-240761r879566_rule
- SV-100607
Checks: C-43994r674411_chk
At the command prompt, execute the following command: tail /storage/log/vmware/horizon/localhost_access_log.YYYY-MM-dd.txt Note: Substitute the actual date in the file name. If actual client IP information, not load balancer or proxy server, is not being recorded, this is a finding.
Fix: F-43953r674026_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <RemoteIpValve> below. Note: The "RemoteIpValve" should be configured as follows: <Valve className="org.apache.catalina.valves.RemoteIpValve" httpServerPort="80" httpsServerPort="443" protocolHeader="x-forwarded-proto" proxiesHeader="x-forwarded-by" remoteIpHeader="x-forwarded-for" internalProxies="127\.0\.0\.1"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- VRAU-TC-000210
- Vuln IDs
-
- V-240762
- V-89959
- Rule IDs
-
- SV-240762r879566_rule
- SV-100609
Checks: C-43995r674028_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vco/app-server/localhost_access_log.txt If actual client IP information, not load balancer or proxy server, is not being recorded, this is a finding.
Fix: F-43954r674029_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <RemoteIpValve> below. Note: The "RemoteIpValve" should be configured as follows: <Valve className="org.apache.catalina.valves.RemoteIpValve" remoteIpHeader="x-forwarded-for" remoteIpProxiesHeader="x-forwarded-by" internalProxies=".*" protocolHeader="x-forwarded-proto" />
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- VRAU-TC-000215
- Vuln IDs
-
- V-240763
- V-89961
- Rule IDs
-
- SV-240763r879566_rule
- SV-100611
Checks: C-43996r674413_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vcac/access_log.YYYY-MM-dd.txt Note: Substitute the actual date in the file name. If actual client IP information, not load balancer or proxy server, is not being recorded, this is a finding.
Fix: F-43955r674032_fix
Navigate to and open /etc/vcac/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <RemoteIpValve> below. Note: The "RemoteIpValve" should be configured as follows: <Valve className="org.apache.catalina.valves.RemoteIpValve" httpServerPort="80" httpsServerPort="443" internalProxies="127\.0\.0\.1" protocolHeader="x-forwarded-proto" proxiesHeader="x-forwarded-by" remoteIpHeader="x-forwarded-for"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- VRAU-TC-000220
- Vuln IDs
-
- V-240764
- V-89963
- Rule IDs
-
- SV-240764r879567_rule
- SV-100613
Checks: C-43997r674415_chk
At the command prompt, execute the following command: tail /storage/log/vmware/horizon/localhost_access_log.YYYY-MM-dd.txt Note: Substitute the actual date in the file name. If the HTTP status codes are not being recorded, this is a finding. Note: HTTP status codes are 3-digit codes, which are recorded immediately after "HTTP/1.1"
Fix: F-43956r674035_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- VRAU-TC-000225
- Vuln IDs
-
- V-240765
- V-89965
- Rule IDs
-
- SV-240765r879567_rule
- SV-100615
Checks: C-43998r674417_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vco/app-server/localhost_access_log.txt If the HTTP status codes are not being recorded, this is a finding. Note: HTTP status codes are 3-digit codes, which are recorded immediately after "HTTP/1.1"
Fix: F-43957r674038_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- VRAU-TC-000230
- Vuln IDs
-
- V-240766
- V-89967
- Rule IDs
-
- SV-240766r879567_rule
- SV-100617
Checks: C-43999r674419_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vcac/access_log.YYYY-MM-dd.txt Note: Substitute the actual date in the file name. If the HTTP status codes are not being recorded, this is a finding. Note: HTTP status codes are 3-digit codes, which are recorded immediately after "HTTP/1.1"
Fix: F-43958r674041_fix
Navigate to and open /etc/vcac/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" checkExists="true" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="access_log" requestAttributesEnabled="true" rotatable="false" suffix=".txt"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- VRAU-TC-000235
- Vuln IDs
-
- V-240767
- V-89969
- Rule IDs
-
- SV-240767r879568_rule
- SV-100619
Checks: C-44000r674043_chk
At the command prompt, execute the following command: tail /storage/log/vmware/horizon/localhost_access_log.YYYY-MM-dd.txt Note: Substitute the actual date in the file name. If the identity of the user is not being recorded, this is a finding.
Fix: F-43959r674044_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- VRAU-TC-000240
- Vuln IDs
-
- V-240768
- V-89971
- Rule IDs
-
- SV-240768r879568_rule
- SV-100621
Checks: C-44001r674046_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vco/app-server/localhost_access_log.txt If the identity of the user is not being recorded, this is a finding.
Fix: F-43960r674047_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- VRAU-TC-000245
- Vuln IDs
-
- V-240769
- V-89973
- Rule IDs
-
- SV-240769r879568_rule
- SV-100623
Checks: C-44002r674049_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vcac/access_log.YYYY-MM-dd.txt Note: Substitute the actual date in the file name. If the identity of the user is not being recorded, this is a finding.
Fix: F-43961r674050_fix
Navigate to and open /etc/vcac/server.xml. Navigate to and locate <Host>. Configure the <Host> node with the <AccessLogValve> below. Note: The "AccessLogValve" should be configured as follows: <Valve className="org.apache.catalina.valves.AccessLogValve" checkExists="true" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="access_log" requestAttributesEnabled="true" rotatable="false" suffix=".txt"/>
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000139
- Version
- VRAU-TC-000250
- Vuln IDs
-
- V-240770
- V-89975
- Rule IDs
-
- SV-240770r879570_rule
- SV-100625
Checks: C-44003r674421_chk
Interview the ISSO. Determine if log data and records are configured to alert the ISSO and SA in the event of processing failure. If log data and records are not configured to alert the ISSO and SA in the event of processing failure, this is a finding.
Fix: F-43962r674053_fix
Configure the web server to provide an alert to the ISSO and SA when log processing failures occur. If the web server cannot generate alerts, utilize an external logging system that meets this criterion.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- VRAU-TC-000260
- Vuln IDs
-
- V-240771
- V-89977
- Rule IDs
-
- SV-240771r879576_rule
- SV-100627
Checks: C-44004r674055_chk
At the command prompt, execute the following command: ls -lL /storage/log/vmware/horizon If any log files have permissions less restrictive than "640", this is a finding.
Fix: F-43963r674056_fix
At the command prompt, execute the following commands: chmod 640 /storage/log/vmware/horizon/<file> sed -i "/^[^#]*UMASK/ c\UMASK 077" /etc/login.defs Note: Substitute <file> with the listed file.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- VRAU-TC-000265
- Vuln IDs
-
- V-240772
- V-89979
- Rule IDs
-
- SV-240772r879576_rule
- SV-100629
Checks: C-44005r674058_chk
At the command prompt, execute the following command: ls -lL /storage/log/vmware/vco/app-server If any log files have permissions less restrictive than "640", this is a finding.
Fix: F-43964r674059_fix
At the command prompt, execute the following commands: chmod 640 /storage/log/vmware/vco/app-server/<file> sed -i "/^[^#]*UMASK/ c\UMASK 077" /etc/login.defs Note: Substitute <file> with the listed file.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- VRAU-TC-000270
- Vuln IDs
-
- V-240773
- V-89981
- Rule IDs
-
- SV-240773r879576_rule
- SV-100631
Checks: C-44006r674061_chk
At the command prompt, execute the following command: ls -lL /storage/log/vmware/vcac If any log files have permissions less restrictive than "640", this is a finding.
Fix: F-43965r674062_fix
At the command prompt, execute the following commands: chmod 640 /storage/log/vmware/vcac/<file> sed -i "/^[^#]*UMASK/ c\UMASK 077" /etc/login.defs Note: Substitute <file> with the listed file.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- VRAU-TC-000275
- Vuln IDs
-
- V-240774
- V-89983
- Rule IDs
-
- SV-240774r879577_rule
- SV-100633
Checks: C-44007r674423_chk
At the command prompt, execute the following command: ls -lL /storage/log/vmware/vcac If any log files are not owned by "root" or "vcac", this is a finding. The following files should be owned by "vcac": access_log catalina.out gc_logs host-manager localhost manager tc Server.pid The following files should be owned by "root": system-config-history telemetry toolsgc vcac-config
Fix: F-43966r674065_fix
At the command prompt, execute the following command: chown <owner>:<owner> /storage/log/vmware/vcac/<file> Note: Substitute <file> with the listed file. Note: Substitute <owner> with the correct value below. The following files should be owned by "vcac": access_log catalina.out gc_logs host-manager localhost manager tc Server.pid The following files should be owned by "root": system-config-history telemetry toolsgc vcac-config
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- VRAU-TC-000280
- Vuln IDs
-
- V-240775
- V-89985
- Rule IDs
-
- SV-240775r879577_rule
- SV-100635
Checks: C-44008r674067_chk
At the command prompt, execute the following command: ls -lL /storage/log/vmware/vco/app-server If any log files are not owned by "vco", this is a finding.
Fix: F-43967r674068_fix
At the command prompt, execute the following command: chown vco:vco /storage/log/vmware/vco/app-server/<file> Note: Substitute <file> with the listed file.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- VRAU-TC-000285
- Vuln IDs
-
- V-240776
- V-89987
- Rule IDs
-
- SV-240776r879577_rule
- SV-100637
Checks: C-44009r674070_chk
At the command prompt, execute the following command: ls -lL /storage/log/vmware/vcac If any log files are not owned by "root" or "vcac", this is a finding.
Fix: F-43968r674071_fix
At the command prompt, execute the following command: Set the owner & group of these files: access_log.txt, audit.log, catalina.log, catalina.out, gc_logs.log.0.current, host-manager.log, localhost.log, manager.log, and tomcat.pid to vcac, with the following command: chown vcac:vcac /storage/log/vmware/vcac/<file> Set all other files not listed above to the owner and group of root, with the following command: chown root:root /storage/log/vmware/vcac/<file> Note: Substitute <file> with the listed file.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- VRAU-TC-000290
- Vuln IDs
-
- V-240777
- V-89989
- Rule IDs
-
- SV-240777r879578_rule
- SV-100639
Checks: C-44010r674073_chk
At the command prompt, execute the following command: ls -lL /storage/log/vmware/horizon If any log files are not group-owned by "www", this is a finding.
Fix: F-43969r674074_fix
At the command prompt, execute the following command: chown horizon:www /storage/log/vmware/horizon/<file> Note: Substitute <file> with the listed file.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- VRAU-TC-000295
- Vuln IDs
-
- V-240778
- V-89991
- Rule IDs
-
- SV-240778r879578_rule
- SV-100641
Checks: C-44011r674076_chk
At the command prompt, execute the following command: ls -lL /storage/log/vmware/vco/app-server If any log files are not group-owned by "vco", this is a finding.
Fix: F-43970r674077_fix
At the command prompt, execute the following command: chown vco:vco /storage/log/vmware/vco/app-server/<file> Note: Substitute <file> with the listed file.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- VRAU-TC-000300
- Vuln IDs
-
- V-240779
- V-89993
- Rule IDs
-
- SV-240779r879578_rule
- SV-100643
Checks: C-44012r674079_chk
At the command prompt, execute the following command: ls -lL /storage/log/vmware/vcac If any log files are not group-owned by "root", this is a finding.
Fix: F-43971r674080_fix
At the command prompt, execute the following command: chown root:root /storage/log/vmware/vcac/<file> Note: Substitute <file> with the listed file.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001348
- Version
- VRAU-TC-000305
- Vuln IDs
-
- V-240780
- V-89995
- Rule IDs
-
- SV-240780r879582_rule
- SV-100645
Checks: C-44013r674082_chk
Interview the ISSO. Determine if log data and records are not being backed up onto a different system or media. If log data and records are not being backed up onto a different system or media, this is a finding.
Fix: F-43972r674083_fix
Ensure log data and records are being backed up to a different system or separate media.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- VRAU-TC-000310
- Vuln IDs
-
- V-240781
- V-89997
- Rule IDs
-
- SV-240781r879584_rule
- SV-100647
Checks: C-44014r854837_chk
Interview the ISSO. Determine whether web server files are being fully reviewed, tested, and signed before being implemented into the production environment. If the web server files are not being fully reviewed, tested, and signed before being implemented into the production environment, this is a finding.
Fix: F-43973r674086_fix
Configure the web server to verify object integrity before becoming part of the production web server or utilize an external tool designed to meet this requirement.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- VRAU-TC-000315
- Vuln IDs
-
- V-240782
- V-89999
- Rule IDs
-
- SV-240782r879584_rule
- SV-100649
Checks: C-44015r854839_chk
Interview the ISSO. Determine whether expansion modules are being fully reviewed, tested, and signed before being implemented into the production environment. If the expansion modules are not being fully reviewed, tested, and signed before being implemented into the production environment, this is a finding.
Fix: F-43974r674089_fix
Configure the web server to enforce, internally or through an external utility, the review, testing and signing of modules before implementation into the production environment.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-TC-000320
- Vuln IDs
-
- V-240783
- V-90001
- Rule IDs
-
- SV-240783r879587_rule
- SV-100651
Checks: C-44016r674091_chk
At the command prompt, execute the following command: cat /opt/vmware/horizon/workspace/conf/tomcat-users.xml If "tomcat-users.xml" file contains any user information, this is a finding.
Fix: F-43975r674092_fix
Contact the ISSO and/or SA. Determine why user data is being stored in "tomcat-users.xml". If the user data is not required then it should be removed. The vRA appliance does not maintain user data in this file by default.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-TC-000325
- Vuln IDs
-
- V-240784
- V-90003
- Rule IDs
-
- SV-240784r879587_rule
- SV-100653
Checks: C-44017r674094_chk
At the command prompt, execute the following command: cat /etc/vco/app-server/tomcat-users.xml If "tomcat-users.xml" file contains any user information, this is a finding.
Fix: F-43976r674095_fix
Contact the ISSO and/or SA. Determine why user data is being stored in "tomcat-users.xml". If the user data is not required then it should be removed. The vRA appliance does not maintain user data in this file by default.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-TC-000330
- Vuln IDs
-
- V-240785
- V-90005
- Rule IDs
-
- SV-240785r879587_rule
- SV-100655
Checks: C-44018r674097_chk
At the command prompt, execute the following command: cat /etc/vcac/tomcat-users.xml If "tomcat-users.xml" file contains any user information, this is a finding.
Fix: F-43977r674098_fix
Contact the ISSO and/or SA. Determine why user data is being stored in "tomcat-users.xml". If the user data is not required then it should be removed. The vRA appliance does not maintain user data in this file by default.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-TC-000335
- Vuln IDs
-
- V-240786
- V-90007
- Rule IDs
-
- SV-240786r879587_rule
- SV-100657
Checks: C-44019r674429_chk
Interview the ISSO. Review the web server documentation and deployed configuration to determine if web server features, services, and processes are installed that are not needed for hosted application deployment. If excessive features, services, and processes are installed, this is a finding.
Fix: F-43978r674101_fix
Uninstall or deactivate features, services, and processes not needed by the web server for operation.
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000381
- Version
- VRAU-TC-000345
- Vuln IDs
-
- V-240787
- V-90009
- Rule IDs
-
- SV-240787r879587_rule
- SV-100659
Checks: C-44020r674431_chk
Interview the ISSO. Review the web server documentation and deployed configuration to determine if documentation, sample code, example applications, and tutorials have been removed. If documentation, sample code, example applications, and tutorials have not been removed, this is a finding.
Fix: F-43979r674104_fix
Remove all documentation, sample code, example applications, and tutorials.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-TC-000355
- Vuln IDs
-
- V-240788
- V-90345
- Rule IDs
-
- SV-240788r879587_rule
- SV-100995
Checks: C-44021r674469_chk
Interview the ISSO. Review the web server documentation and deployed configuration to determine if utility programs, services, plug-ins, and modules not necessary for operation have been removed. If utility programs, services, plug-ins, and modules not necessary for operation have not been removed, this is a finding.
Fix: F-43980r674107_fix
Remove all utility programs, services, plug-ins, and modules not necessary for operation.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-TC-000360
- Vuln IDs
-
- V-240789
- V-90011
- Rule IDs
-
- SV-240789r879587_rule
- SV-100661
Checks: C-44022r674109_chk
At the command prompt, execute the following command: find / -name 'web.xml' -print0 | xargs -0r grep -HEn '(x-csh<)|(x-sh<)|(x-shar<)|(x-ksh<)' If the command produces any output, this is a finding.
Fix: F-43981r674110_fix
Navigate to a file that was listed. Open the file in a text editor. Delete any of the following types: application/x-sh application/x-shar application/x-csh application/x-ksh
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-TC-000365
- Vuln IDs
-
- V-240790
- V-90013
- Rule IDs
-
- SV-240790r879587_rule
- SV-100663
Checks: C-44023r674112_chk
Interview the ISSO. Review the web server documentation and deployed configuration to determine if all mappings to unused and vulnerable scripts to be removed. If all mappings to unused and vulnerable scripts have not been removed, this is a finding.
Fix: F-43982r674113_fix
Remove script mappings that are not needed for web server and hosted application operation.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-TC-000370
- Vuln IDs
-
- V-240791
- V-90015
- Rule IDs
-
- SV-240791r879587_rule
- SV-100665
Checks: C-44024r674115_chk
At the command prompt, execute the following command: grep -E '<url-pattern>\*\.jsp</url-pattern>' -B 2 -A 2 /opt/vmware/horizon/workspace/conf/web.xml If the jsp and jspx file extensions have not been mapped to the JSP servlet, this is a finding.
Fix: F-43983r674116_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/web.xml. Navigate to and locate the mapping for the JSP servlet. It is the <servlet-mapping> node that contains <servlet-name>jsp</servlet-name>. Configure the <servlet-mapping> node to look like the code snippet below: <!-- The mappings for the JSP servlet --> <servlet-mapping> <servlet-name>jsp</servlet-name> <url-pattern>*.jsp</url-pattern> <url-pattern>*.jspx</url-pattern> </servlet-mapping>
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-TC-000375
- Vuln IDs
-
- V-240792
- V-90017
- Rule IDs
-
- SV-240792r879587_rule
- SV-100667
Checks: C-44025r674118_chk
At the command prompt, execute the following command: grep -E '<url-pattern>\*\.jsp</url-pattern>' -B 2 -A 2 /etc/vco/app-server/web.xml If the jsp and jspx file extensions have not been mapped to the JSP servlet, this is a finding.
Fix: F-43984r674119_fix
Navigate to and open /etc/vco/app-server/web.xml. Navigate to and locate the mapping for the JSP servlet. It is the <servlet-mapping> node that contains <servlet-name>jsp</servlet-name>. Configure the <servlet-mapping> node to look like the code snippet below: <!-- The mappings for the JSP servlet --> <servlet-mapping> <servlet-name>jsp</servlet-name> <url-pattern>*.jsp</url-pattern> <url-pattern>*.jspx</url-pattern> </servlet-mapping>
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-TC-000380
- Vuln IDs
-
- V-240793
- V-90019
- Rule IDs
-
- SV-240793r879587_rule
- SV-100669
Checks: C-44026r674121_chk
At the command prompt, execute the following command: grep -E '<url-pattern>\*\.jsp</url-pattern>' -B 2 -A 2 /etc/vcac/web.xml If the jsp and jspx file extensions have not been mapped to the JSP servlet, this is a finding.
Fix: F-43985r674122_fix
Navigate to and open /etc/vcac/web.xml. Navigate to and locate the mapping for the JSP servlet. It is the <servlet-mapping> node that contains <servlet-name>jsp</servlet-name>. Configure the <servlet-mapping> node to look like the code snippet below: <!-- The mappings for the JSP servlet --> <servlet-mapping> <servlet-name>jsp</servlet-name> <url-pattern>*.jsp</url-pattern> <url-pattern>*.jspx</url-pattern> </servlet-mapping>
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-TC-000385
- Vuln IDs
-
- V-240794
- V-90021
- Rule IDs
-
- SV-240794r879587_rule
- SV-100671
Checks: C-44027r674124_chk
At the command prompt, execute the following command: find / -name 'web.xml' -print0 | xargs -0r grep -HEn 'webdav' If the command produces any output, this is a finding.
Fix: F-43986r674125_fix
Navigate to and open all listed files. Navigate to and locate the mapping for the JSP servlet. It is the <servlet-mapping> node that contains <servlet-name>webdav</servlet-name>. Remove the WebDAV servlet and any mapping associated with it.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-TC-000390
- Vuln IDs
-
- V-240795
- V-90023
- Rule IDs
-
- SV-240795r879587_rule
- SV-100673
Checks: C-44028r674127_chk
At the command prompt, execute the following command: grep JreMemoryLeakPreventionListener /opt/vmware/horizon/workspace/conf/server.xml If the JreMemoryLeakPreventionListener <Listener> node is not listed, this is a finding.
Fix: F-43987r674128_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to the <Server> node. Add '<Listener className="org.apache.catalina.core.JreMemoryLeakPreventionListener"/>' to the <Server> node.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-TC-000395
- Vuln IDs
-
- V-240796
- V-90025
- Rule IDs
-
- SV-240796r879587_rule
- SV-100675
Checks: C-44029r674130_chk
At the command prompt, execute the following command: grep JreMemoryLeakPreventionListener /etc/vco/app-server/server.xml If the JreMemoryLeakPreventionListener <Listener> node is not listed, this is a finding.
Fix: F-43988r674131_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to the <Server> node. Add '<Listener className="org.apache.catalina.core.JreMemoryLeakPreventionListener"/>' to the <Server> node.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-TC-000400
- Vuln IDs
-
- V-240797
- V-90027
- Rule IDs
-
- SV-240797r879587_rule
- SV-100677
Checks: C-44030r674133_chk
At the command prompt, execute the following command: grep JreMemoryLeakPreventionListener /etc/vcac/server.xml If the JreMemoryLeakPreventionListener <Listener> node is not listed, this is a finding.
Fix: F-43989r674134_fix
Navigate to and open /etc/vcac/server.xml. Navigate to the <Server> node. Add '<Listener className="org.apache.catalina.core.JreMemoryLeakPreventionListener"/>' to the <Server> node.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-TC-000410
- Vuln IDs
-
- V-240798
- V-90029
- Rule IDs
-
- SV-240798r879587_rule
- SV-100679
Checks: C-44031r674136_chk
At the command prompt, execute the following command: ls -lR /usr/lib/vco/configuration/webapps | grep '^l' If the command produces any output, this is a finding.
Fix: F-43990r674137_fix
At the command prompt, execute the following commands: Note: Replace <file_name> for the name of any files that were returned. unlink <file_name> Repeat the commands for each file that was returned.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- VRAU-TC-000420
- Vuln IDs
-
- V-240799
- V-90031
- Rule IDs
-
- SV-240799r879588_rule
- SV-100681
Checks: C-44032r674139_chk
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. If either the IP address or the port is not specified for each <Connector>, this is a finding.
Fix: F-43991r674140_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. Configure each <Connector> node with the value 'address="XXXXX"'. Note: Replace XXXXX with the appropriate address for that node.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- VRAU-TC-000425
- Vuln IDs
-
- V-240800
- V-90033
- Rule IDs
-
- SV-240800r879588_rule
- SV-100683
Checks: C-44033r674142_chk
Navigate to and open /etc/vco/app-server/server.xml. Navigate to the <Connector> node. If either the IP address or the port is not specified for the <Connector>, this is a finding.
Fix: F-43992r674143_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to the <Connector> node. Configure the <Connector> node with the value 'address="XXXXX"'. Note: Replace XXXXX with the appropriate address for that node.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- VRAU-TC-000430
- Vuln IDs
-
- V-240801
- V-90035
- Rule IDs
-
- SV-240801r879588_rule
- SV-100685
Checks: C-44034r674145_chk
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. If either the IP address or the port is not specified for the <Connector>, this is a finding.
Fix: F-43993r674146_fix
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. Configure the <Connector> node with the value 'address="XXXXX"'. Note: Replace XXXXX with the appropriate address for that node.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- VRAU-TC-000435
- Vuln IDs
-
- V-240802
- V-90037
- Rule IDs
-
- SV-240802r879609_rule
- SV-100687
Checks: C-44035r674148_chk
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. If the value of "SSLEnabled" is not set to "true" or is missing, this is a finding.
Fix: F-43994r674149_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. Configure each <Connector> node with the value 'SSLEnabled="true"'.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- VRAU-TC-000440
- Vuln IDs
-
- V-240803
- V-90039
- Rule IDs
-
- SV-240803r879609_rule
- SV-100689
Checks: C-44036r674151_chk
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. If the value of "SSLEnabled" is not set to "true" or is missing, this is a finding.
Fix: F-43995r674152_fix
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. Configure each <Connector> node with the value 'SSLEnabled="true"'.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- VRAU-TC-000445
- Vuln IDs
-
- V-240804
- V-90041
- Rule IDs
-
- SV-240804r879612_rule
- SV-100691
Checks: C-44037r674433_chk
If PKI is not being used, this check is Not Applicable. Interview the ISSO. Review tc Server ALL configuration to verify that certificates being provided by the client are being validated in accordance with RFC 5280. If certificates are not being validated in accordance with RFC 5280, this is a finding.
Fix: F-43996r674155_fix
If PKI is not being used, this check is Not Applicable. Validate client certificates in accordance with RFC 5280.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- VRAU-TC-000450
- Vuln IDs
-
- V-240805
- V-90347
- Rule IDs
-
- SV-240805r879613_rule
- SV-100997
Checks: C-44038r674471_chk
At the command prompt, execute the following command: ls -al /opt/vmware/horizon/workspace/conf/tcserver.keystore Verify that file permissions are set to "640" or more restrictive. Verify that the owner is horizon and group-owner is www. If either of these conditions are not met, this is a finding.
Fix: F-43997r674158_fix
At the command prompt, execute the following commands: chown horizon:www /opt/vmware/horizon/workspace/conf/tcserver.keystore chmod 640 /opt/vmware/horizon/workspace/conf/tcserver.keystore
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- VRAU-TC-000460
- Vuln IDs
-
- V-240806
- V-90043
- Rule IDs
-
- SV-240806r879616_rule
- SV-100693
Checks: C-44039r674435_chk
At the command prompt, execute the following command: grep bio-ssl.cipher.list /opt/vmware/horizon/workspace/conf/catalina.properties If the value of "bio-ssl.cipher.list" does not match the list of FIPS 140-2 ciphers or is missing, this is a finding. Note: To view a list of FIPS 140-2 ciphers, at the command prompt execute the following command: openssl ciphers 'FIPS'
Fix: F-43998r674161_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/catalina.properties. Navigate to and locate "bio-ssl.cipher.list". Configure the "bio-ssl.cipher.list" with FIPS 140-2 compliant ciphers.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- VRAU-TC-000465
- Vuln IDs
-
- V-240807
- V-90045
- Rule IDs
-
- SV-240807r879616_rule
- SV-100695
Checks: C-44040r674437_chk
At the command prompt, execute the following command: grep cipher /etc/vcac/catalina.properties If the value of "cipher" does not match the list of FIPS 140-2 ciphers or is missing, this is a finding. Note: To view a list of FIPS 140-2 ciphers, at the command prompt execute the following command: openssl ciphers 'FIPS'
Fix: F-43999r674164_fix
Navigate to and open /etc/vcac/catalina.properties. Navigate to and locate "cipher". Configure the "cipher" with FIPS 140-2 compliant ciphers.
- RMF Control
- SC-2
- Severity
- H
- CCI
- CCI-001082
- Version
- VRAU-TC-000475
- Vuln IDs
-
- V-240808
- V-90047
- Rule IDs
-
- SV-240808r879631_rule
- SV-100697
Checks: C-44041r674166_chk
At the command prompt, execute the following command: ls -alR /opt/vmware/horizon/workspace/webapps | grep -E '^-' | awk '$3 !~ /horizon|root/ {print}' If the command produces any output, this is a finding.
Fix: F-44000r674167_fix
At the command prompt, execute the following command: chown horizon:www <file_name> Repeat the command for each file that was returned. Note: Replace <file_name> for the name of the file that was returned.
- RMF Control
- SC-2
- Severity
- H
- CCI
- CCI-001082
- Version
- VRAU-TC-000480
- Vuln IDs
-
- V-240809
- V-90049
- Rule IDs
-
- SV-240809r879631_rule
- SV-100699
Checks: C-44042r674169_chk
At the command prompt, execute the following command: ls -lL /usr/lib/vco/configuration/webapps If the listed files are not owned by "vco", this is a finding.
Fix: F-44001r674170_fix
At the command prompt, execute the following command: chown vco:vco <file_name> Repeat the command for each file that was returned. Note: Replace <file_name> for the name of the file that was returned.
- RMF Control
- SC-2
- Severity
- H
- CCI
- CCI-001082
- Version
- VRAU-TC-000485
- Vuln IDs
-
- V-240810
- V-90051
- Rule IDs
-
- SV-240810r879631_rule
- SV-100701
Checks: C-44043r674172_chk
At the command prompt, execute the following command: ls -alR /etc/vcac /usr/lib/vcac/server/webapps | grep -E '^-' | awk '$3 !~ /vcac|root/ {print}' If the command produces any output, this is a finding.
Fix: F-44002r674173_fix
At the command prompt, execute the following command: If the file was found in /etc/vcac or /usr/lib/vcac/server/webapps, execute the following command: chown vcac:vcac <file_name> Note: Replace <file_name> for the name of the file that was returned.
- RMF Control
- SC-2
- Severity
- H
- CCI
- CCI-001082
- Version
- VRAU-TC-000490
- Vuln IDs
-
- V-240811
- V-90053
- Rule IDs
-
- SV-240811r879631_rule
- SV-100703
Checks: C-44044r674175_chk
At the command prompt, execute the following command: ls -alR /opt/vmware/horizon/workspace | grep -E '^-' | awk '$1 !~ /---$/ {print}' If the command produces any output, this is a finding.
Fix: F-44003r674176_fix
At the command prompt, execute the following command: chmod 750 <file_name> Repeat the command for each file that was returned. Note: Replace <file_name> for the name of the file that was returned.
- RMF Control
- SC-2
- Severity
- H
- CCI
- CCI-001082
- Version
- VRAU-TC-000495
- Vuln IDs
-
- V-240812
- V-90055
- Rule IDs
-
- SV-240812r879631_rule
- SV-100705
Checks: C-44045r674178_chk
At the command prompt, execute the following command: ls -alR /etc/vco /usr/lib/vco/app-server | grep -E '^-' | awk '$1 !~ /---$/ {print}' If anything is returned, this is a finding.
Fix: F-44004r674179_fix
At the command prompt, execute the following command: chmod 750 <file_name> Repeat the command for each file that was returned. Note: Replace <file_name> for the name of the file that was returned.
- RMF Control
- SC-2
- Severity
- H
- CCI
- CCI-001082
- Version
- VRAU-TC-000500
- Vuln IDs
-
- V-240813
- V-90057
- Rule IDs
-
- SV-240813r879631_rule
- SV-100707
Checks: C-44046r674181_chk
At the command prompt, execute the following command: ls -alR /etc/vcac /usr/lib/vcac/server/webapps | grep -E '^-' | awk '$1 !~ /---$/ {print}' If the command produces any output, this is a finding.
Fix: F-44005r674182_fix
At the command prompt, execute the following command: chmod 750 <file_name> Repeat the command for each file that was returned. Note: Replace <file_name> for the name of the file that was returned.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- VRAU-TC-000550
- Vuln IDs
-
- V-240814
- V-90059
- Rule IDs
-
- SV-240814r879640_rule
- SV-100709
Checks: C-44047r674184_chk
Interview the ISSO. Review the web server documentation and deployed configuration to determine if the tc Server code baseline is documented and maintained. If the tc Server code baseline is not documented and maintained, this is a finding.
Fix: F-44006r674185_fix
Develop baseline documentation of the tc Server codebase.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- VRAU-TC-000555
- Vuln IDs
-
- V-240815
- V-90061
- Rule IDs
-
- SV-240815r879640_rule
- SV-100711
Checks: C-44048r674187_chk
At the command line, execute the following command: grep EXIT_ON_INIT_FAILURE /opt/vmware/horizon/workspace/conf/catalina.properties If the "org.apache.catalina.startup.EXIT_ON_INIT_FAILURE" setting is not set to "true" or is missing, this is a finding.
Fix: F-44007r674188_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/catalina.properties. Configure the setting "org.apache.catalina.startup.EXIT_ON_INIT_FAILURE" with the value "true". Note: The word "true" should not be surrounded with any quote characters.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- VRAU-TC-000560
- Vuln IDs
-
- V-240816
- V-90063
- Rule IDs
-
- SV-240816r879640_rule
- SV-100713
Checks: C-44049r674190_chk
At the command line, execute the following command: grep EXIT_ON_INIT_FAILURE /etc/vco/app-server/catalina.properties If the "org.apache.catalina.startup.EXIT_ON_INIT_FAILURE" setting is not set to "true" or is missing, this is a finding.
Fix: F-44008r674191_fix
Navigate to and open /etc/vco/app-server/catalina.properties. Configure the setting "org.apache.catalina.startup.EXIT_ON_INIT_FAILURE" with the value "true". Note: The word "true" should not be surrounded with any quote characters.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- VRAU-TC-000565
- Vuln IDs
-
- V-240817
- V-90065
- Rule IDs
-
- SV-240817r879640_rule
- SV-100715
Checks: C-44050r674193_chk
At the command line, execute the following command: grep EXIT_ON_INIT_FAILURE /etc/vcac/catalina.properties If the "org.apache.catalina.startup.EXIT_ON_INIT_FAILURE" setting is not set to "true" or is missing, this is a finding.
Fix: F-44009r674194_fix
Navigate to and open /etc/vcac/catalina.properties. Configure the setting "org.apache.catalina.startup.EXIT_ON_INIT_FAILURE" with the value "true". Note: The word "true" should not be surrounded with any quote characters.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- VRAU-TC-000580
- Vuln IDs
-
- V-240818
- V-90067
- Rule IDs
-
- SV-240818r879643_rule
- SV-100717
Checks: C-44051r674196_chk
At the command prompt, execute the following commands: df -k /usr/java/jre-vmware df -k /opt/vmware/horizon/workspace/webapps If the two directories above are on the same partition, this is a finding.
Fix: F-44010r674197_fix
Consult with the ISSO. Move the tc Server HORIZON /opt/vmware/horizon/workspace/webapps folder to a separate partition.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- VRAU-TC-000585
- Vuln IDs
-
- V-240819
- V-90069
- Rule IDs
-
- SV-240819r879643_rule
- SV-100719
Checks: C-44052r674199_chk
At the command prompt, execute the following commands: df -k /usr/java/jre-vmware df -k /usr/lib/vco/configuration/webapps If the two directories above are on the same partition, this is a finding.
Fix: F-44011r674200_fix
Consult with the ISSO. Move the tc Server VCO /usr/lib/vco/configuration/webapps folder to a separate partition.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- VRAU-TC-000590
- Vuln IDs
-
- V-240820
- V-90071
- Rule IDs
-
- SV-240820r879643_rule
- SV-100721
Checks: C-44053r674202_chk
At the command prompt, execute the following commands: df -k /usr/java/jre-vmware df -k /usr/lib/vcac/server/webapps If the two directories above are on the same partition, this is a finding.
Fix: F-44012r674203_fix
Consult with the ISSO. Move the tc Server VCAC /usr/lib/vcac/server/webapps folder to a separate partition.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- VRAU-TC-000610
- Vuln IDs
-
- V-240824
- V-90079
- Rule IDs
-
- SV-240824r879652_rule
- SV-100729
Checks: C-44057r674214_chk
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. If the value of "URIEncoding" is not set to "UTF-8" or is missing, this is a finding.
Fix: F-44016r674215_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. Configure each <Connector> node with the value 'URIEncoding="UTF-8"'.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- VRAU-TC-000615
- Vuln IDs
-
- V-240825
- V-90081
- Rule IDs
-
- SV-240825r879652_rule
- SV-100731
Checks: C-44058r674217_chk
Navigate to and open /etc/vco/app-server/server.xml. Navigate to the <Connector> node. If the value of "URIEncoding" is not set to "UTF-8" or is missing, this is a finding.
Fix: F-44017r674218_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to the <Connector> node. Configure each <Connector> node with the value 'URIEncoding="UTF-8"'.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- VRAU-TC-000620
- Vuln IDs
-
- V-240826
- V-90083
- Rule IDs
-
- SV-240826r879652_rule
- SV-100733
Checks: C-44059r674220_chk
Navigate to and open /opt/vmware/horizon/workspace/conf/web.xml. Verify that the 'setCharacterEncodingFilter' <filter> has been specified. If the "setCharacterEncodingFilter" filter has not been specified or is commented out, this is a finding.
Fix: F-44018r674221_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/web.xml. Configure the <web-app> node with the <filter> node listed below. <filter> <filter-name>setCharacterEncodingFilter</filter-name> <filter-class>org.apache.catalina.filters.SetCharacterEncodingFilter</filter-class> <init-param> <param-name>encoding</param-name> <param-value>UTF-8</param-value> <param-name>ignore</param-name> <param-value>false</param-value> </init-param> <async-supported>true</async-supported> </filter>
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- VRAU-TC-000625
- Vuln IDs
-
- V-240827
- V-90085
- Rule IDs
-
- SV-240827r879652_rule
- SV-100735
Checks: C-44060r674223_chk
Navigate to and open /etc/vco/app-server/web.xml. Verify that the 'setCharacterEncodingFilter' <filter> has been specified. If the "setCharacterEncodingFilter" filter has not been specified or is commented out, this is a finding.
Fix: F-44019r674224_fix
Navigate to and open /etc/vco/app-server/web.xml. Configure the <web-app> node with the <filter> node listed below. <filter> <filter-name>setCharacterEncodingFilter</filter-name> <filter-class>org.apache.catalina.filters.SetCharacterEncodingFilter</filter-class> <init-param> <param-name>encoding</param-name> <param-value>UTF-8</param-value> <param-name>ignore</param-name> <param-value>false</param-value> </init-param> <async-supported>true</async-supported> </filter>
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- VRAU-TC-000630
- Vuln IDs
-
- V-240828
- V-90087
- Rule IDs
-
- SV-240828r879652_rule
- SV-100737
Checks: C-44061r674226_chk
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. If the value of "URIEncoding" is not set to "UTF-8" or is missing, this is a finding.
Fix: F-44020r674227_fix
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. Configure the <Connector> node with the value 'URIEncoding="UTF-8"'.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- VRAU-TC-000635
- Vuln IDs
-
- V-240829
- V-90089
- Rule IDs
-
- SV-240829r879652_rule
- SV-100739
Checks: C-44062r674229_chk
Navigate to and open /etc/vcac/web.xml. Verify that the 'setCharacterEncodingFilter' <filter> has been specified. If the "setCharacterEncodingFilter" filter has not been specified or is commented out, this is a finding.
Fix: F-44021r674230_fix
Navigate to and open /etc/vcac/web.xml. Configure the <web-app> node with the <filter> node listed below. <filter> <filter-name>setCharacterEncodingFilter</filter-name> <filter-class>org.apache.catalina.filters.SetCharacterEncodingFilter</filter-class> <init-param> <param-name>encoding</param-name> <param-value>UTF-8</param-value> <param-name>ignore</param-name> <param-value>false</param-value> </init-param> <async-supported>true</async-supported> </filter>
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VRAU-TC-000640
- Vuln IDs
-
- V-240830
- V-90091
- Rule IDs
-
- SV-240830r879655_rule
- SV-100741
Checks: C-44063r674232_chk
At the command prompt, execute the following command: grep -E -A 4 '<welcome-file-list' /opt/vmware/horizon/workspace/conf/web.xml If a <welcome-file> node is not set to a default web page, this is a finding.
Fix: F-44022r674233_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/web.xml. Inspect the file and ensure that it contains the below section: <welcome-file-list> <welcome-file>index.html</welcome-file> <welcome-file>index.htm</welcome-file> <welcome-file>index.jsp</welcome-file> </welcome-file-list>
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VRAU-TC-000645
- Vuln IDs
-
- V-240831
- V-90093
- Rule IDs
-
- SV-240831r879655_rule
- SV-100743
Checks: C-44064r674235_chk
At the command prompt, execute the following command: grep -E -A 4 '<welcome-file-list' /etc/vco/app-server/web.xml If a <welcome-file> node is not set to a default web page, this is a finding.
Fix: F-44023r674236_fix
Navigate to and open /etc/vco/app-server/web.xml. Inspect the file and ensure that it contains the below section: <welcome-file-list> <welcome-file>index.html</welcome-file> <welcome-file>index.htm</welcome-file> <welcome-file>index.jsp</welcome-file> </welcome-file-list>
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VRAU-TC-000650
- Vuln IDs
-
- V-240832
- V-90095
- Rule IDs
-
- SV-240832r879655_rule
- SV-100745
Checks: C-44065r674238_chk
At the command prompt, execute the following command: grep -E -A 4 '<welcome-file-list' /etc/vcac/web.xml If a <welcome-file> node is not set to a default web page, this is a finding.
Fix: F-44024r674239_fix
Navigate to and open /etc/vcac/web.xml. Inspect the file and ensure that it contains the below section: <welcome-file-list> <welcome-file>index.html</welcome-file> <welcome-file>index.htm</welcome-file> <welcome-file>index.jsp</welcome-file> </welcome-file-list>
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VRAU-TC-000660
- Vuln IDs
-
- V-240833
- V-90097
- Rule IDs
-
- SV-240833r879655_rule
- SV-100747
Checks: C-44066r674241_chk
At the command prompt, execute the following command: grep allowTrace /opt/vmware/horizon/workspace/conf/server.xml If "allowTrace" is set to "true", this is a finding. Note: If no line is returned this is NOT a finding.
Fix: F-44025r674242_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to and locate 'allowTrace="true"'. Remove the 'allowTrace="true"' setting.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VRAU-TC-000665
- Vuln IDs
-
- V-240834
- V-90099
- Rule IDs
-
- SV-240834r879655_rule
- SV-100749
Checks: C-44067r674244_chk
At the command prompt, execute the following command: grep allowTrace /etc/vco/app-server/server.xml If "allowTrace" is set to "true", this is a finding. Note: If no line is returned this is NOT a finding.
Fix: F-44026r674245_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to and locate 'allowTrace="true"'. Remove the 'allowTrace="true"' setting.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VRAU-TC-000670
- Vuln IDs
-
- V-240835
- V-90101
- Rule IDs
-
- SV-240835r879655_rule
- SV-100751
Checks: C-44068r674247_chk
At the command prompt, execute the following command: grep allowTrace /etc/vcac/server.xml If "allowTrace" is set to "true", this is a finding. Note: If no line is returned this is NOT a finding.
Fix: F-44027r674248_fix
Navigate to and open /etc/vcac/server.xml. Navigate to and locate 'allowTrace="true"'. Remove the 'allowTrace="true"' setting.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VRAU-TC-000675
- Vuln IDs
-
- V-240836
- V-90103
- Rule IDs
-
- SV-240836r879655_rule
- SV-100753
Checks: C-44069r674250_chk
At the command prompt, execute the following command: grep -En -A 2 -B 1 '<param-name>debug</param-name>' /opt/vmware/horizon/workspace/conf/web.xml If all instances of the debug parameter are not set to "0", this is a finding.
Fix: F-44028r674251_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/web.xml. Navigate to all <debug> nodes that are not set to "0". Set the <param-value> to "0" in all <param-name>debug</param-name> nodes. Note: The debug setting should look like the below: <init-param> <param-name>debug</param-name> <param-value>0</param-value> </init-param>
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VRAU-TC-000680
- Vuln IDs
-
- V-240837
- V-90105
- Rule IDs
-
- SV-240837r879655_rule
- SV-100755
Checks: C-44070r674253_chk
At the command prompt, execute the following command: grep -En -A 2 -B 1 '<param-name>debug</param-name>' /etc/vco/app-server/web.xml If all instances of the debug parameter are not set to "0", this is a finding.
Fix: F-44029r674254_fix
Navigate to and open /etc/vco/app-server/web.xml. Navigate to all <debug> nodes that are not set to "0". Set the <param-value> to "0" in all <param-name>debug</param-name> nodes. Note: The debug setting should look like the below: <init-param> <param-name>debug</param-name> <param-value>0</param-value> </init-param>
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VRAU-TC-000685
- Vuln IDs
-
- V-240838
- V-90107
- Rule IDs
-
- SV-240838r879655_rule
- SV-100757
Checks: C-44071r674256_chk
At the command prompt, execute the following command: grep -En -A 2 -B 1 '<param-name>debug</param-name>' /etc/vcac/web.xml If all instances of the debug parameter are not set to "0", this is a finding.
Fix: F-44030r674257_fix
Navigate to and open /etc/vcac/web.xml. Navigate to all <debug> nodes that are not set to "0". Set the <param-value> to "0" in all <param-name>debug</param-name> nodes. Note: The debug setting should look like the below: <init-param> <param-name>debug</param-name> <param-value>0</param-value> </init-param>
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- VRAU-TC-000695
- Vuln IDs
-
- V-240839
- V-90109
- Rule IDs
-
- SV-240839r879673_rule
- SV-100759
Checks: C-44072r674259_chk
At the command prompt, execute the following command: grep session-timeout /opt/vmware/horizon/workspace/conf/web.xml If the value of <session-timeout> is not "30" or is missing, this is a finding.
Fix: F-44031r674260_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/web.xml. Navigate to the <session-config> node. Add the <session-timeout>30</session-timeout> node setting to the <session-config> node.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- VRAU-TC-000700
- Vuln IDs
-
- V-240840
- V-90111
- Rule IDs
-
- SV-240840r879673_rule
- SV-100761
Checks: C-44073r674262_chk
At the command prompt, execute the following command: grep session-timeout /etc/vco/app-server/web.xml If the value of <session-timeout> is not "30" or is missing, this is a finding.
Fix: F-44032r674263_fix
Navigate to and open /etc/vco/app-server/web.xml. Navigate to the <session-config> node. Add the <session-timeout>30</session-timeout> node setting to the <session-config> node.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- VRAU-TC-000705
- Vuln IDs
-
- V-240841
- V-90113
- Rule IDs
-
- SV-240841r879673_rule
- SV-100763
Checks: C-44074r674265_chk
At the command prompt, execute the following command: grep session-timeout /etc/vcac/web.xml If the value of <session-timeout> is not "30" or is missing, this is a finding.
Fix: F-44033r674266_fix
Navigate to and open /etc/vcac/web.xml. Navigate to the <session-config> node. Add the <session-timeout>30</session-timeout> node setting to the <session-config> node.
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-002314
- Version
- VRAU-TC-000710
- Vuln IDs
-
- V-240842
- V-90115
- Rule IDs
-
- SV-240842r879692_rule
- SV-100765
Checks: C-44075r854844_chk
Obtain the correct configuration data for the Authentication Source from the ISSO. Open a web browser, and type in the vRA URL. 1. Log on to the Tenant Administration Portal. 2. Click on Administration >> Directories Management. 3. Click on "Policies". 4. Click on the "Policy Set" link. 5. Verify that User Authentication is configured correctly. If the Authentication Source is not configured in accordance with site policy, this is a finding.
Fix: F-44034r674269_fix
Obtain the correct configuration data for the Authentication Source from the ISSO. Open a web browser, and type in the vRA URL. 1. Log on to the Tenant Administration Portal. 2. Click on Administration >> Directories Management. 3. Click on "Policies". 4. Click on the "Policy Set" link. 5. Modify the Authentication Source in accordance with site policy.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- VRAU-TC-000715
- Vuln IDs
-
- V-240843
- V-90117
- Rule IDs
-
- SV-240843r879692_rule
- SV-100767
Checks: C-44076r674271_chk
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. If the value of "scheme" is not set to "https" or is missing, this is a finding.
Fix: F-44035r674272_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. Configure each <Connector> node with the value 'scheme="https"'.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- VRAU-TC-000720
- Vuln IDs
-
- V-240844
- V-90119
- Rule IDs
-
- SV-240844r879692_rule
- SV-100769
Checks: C-44077r674274_chk
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. If the value of "scheme" is not set to "https" or is missing, this is a finding.
Fix: F-44036r674275_fix
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. Configure the <Connector> node with the value 'scheme="https"'.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- VRAU-TC-000740
- Vuln IDs
-
- V-240845
- V-90121
- Rule IDs
-
- SV-240845r879730_rule
- SV-100771
Checks: C-44078r674277_chk
Interview the ISSO. Determine if tc Server ALL is using a logging mechanism that is configured to have a capacity large enough to accommodate logging requirements. If the logging mechanism does not have sufficient capacity, this is a finding.
Fix: F-44037r674278_fix
Configure the web server to use a logging mechanism that is configured to allocate log record storage capacity in accordance with NIST SP 800-92 log record storage requirements.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- VRAU-TC-000750
- Vuln IDs
-
- V-240846
- V-90349
- Rule IDs
-
- SV-240846r879731_rule
- SV-100999
Checks: C-44079r854849_chk
Interview the ISSO. Review the site policy for moving log files from the web server to a permanent repository. Ensure that log files are being moved from the web server in accordance with the site policy. If the site does not have a policy for periodically moving log files to an archive repository or such policy is not being enforced, this is a finding.
Fix: F-44038r674281_fix
Develop and enforce a site procedure for moving log files periodically from the web server to a permanent repository in accordance with site retention policies.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- VRAU-TC-000755
- Vuln IDs
-
- V-240847
- V-90123
- Rule IDs
-
- SV-240847r879732_rule
- SV-100773
Checks: C-44080r854851_chk
Interview the ISSO. Review site documentation and system configuration. Determine if the system has a logging mechanism that will provide a warning to the ISSO and SA when allocated record storage volume reaches 75% of maximum log record storage capacity. If such an alert mechanism is not in use, this is a finding.
Fix: F-44039r674284_fix
Configure the tc Server ALL logging mechanism to alert the ISSO / SA when the logs have reached 75% of storage capacity.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001890
- Version
- VRAU-TC-000760
- Vuln IDs
-
- V-240848
- V-90125
- Rule IDs
-
- SV-240848r879747_rule
- SV-100775
Checks: C-44081r854853_chk
At the command prompt, execute the following command: tail /storage/log/vmware/horizon/localhost_access_log.YYYY-MM-dd.txt If the timestamp does not contain a time zone mapping, this is a finding. Note: Substitute the actual date in the file name. Note: In Common Log Format, a timestamp will look like [06/Feb/2016:23:12:57 +0000]. The +0000 part is the time zone mapping.
Fix: F-44040r674287_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to the <Valve className="org.apache.catalina.valves.AccessLogValve"> node. Set the "pattern" setting with "%h %l %u %t "%r" %s %b". Note: The <Valve> node should be configured per the following: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001890
- Version
- VRAU-TC-000765
- Vuln IDs
-
- V-240849
- V-90127
- Rule IDs
-
- SV-240849r879747_rule
- SV-100777
Checks: C-44082r854855_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vco/app-server/localhost_access_log.txt If the timestamp does not contain a time zone mapping, this is a finding. Note: In Common Log Format, a timestamp will look like [06/Feb/2016:23:12:57 +0000]. The +0000 part is the time zone mapping.
Fix: F-44041r674290_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to the <Valve className="org.apache.catalina.valves.AccessLogValve"> node. Set the "pattern" setting with "%h %l %u %t "%r" %s %b". Note: The <Valve> node should be configured per the following: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001890
- Version
- VRAU-TC-000770
- Vuln IDs
-
- V-240850
- V-90129
- Rule IDs
-
- SV-240850r879747_rule
- SV-100779
Checks: C-44083r854857_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vcac/access_log.YYYY-MM-dd.txt If the timestamp does not contain a time zone mapping, this is a finding. Note: Substitute the actual date in the file name. Note: In Common Log Format, a timestamp will look like [06/Feb/2016:23:12:57 +0000]. The +0000 part is the time zone mapping.
Fix: F-44042r674293_fix
Navigate to and open /etc/vcac/server.xml. Navigate to the <Valve className="org.apache.catalina.valves.AccessLogValve"> node. Set the "pattern" setting with "%h %l %u %t "%r" %s %b". Note: The <Valve> node should be configured per the following: <Valve className="org.apache.catalina.valves.AccessLogValve" checkExists="true" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="access_log" requestAttributesEnabled="true" rotatable="false" suffix=".txt"/>
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001889
- Version
- VRAU-TC-000775
- Vuln IDs
-
- V-240851
- V-90131
- Rule IDs
-
- SV-240851r879748_rule
- SV-100781
Checks: C-44084r854859_chk
At the command prompt, execute the following command: tail /storage/log/vmware/horizon/localhost_access_log.YYYY-MM-dd.txt If the timestamp does not contain a minimum granularity of one second, this is a finding. Note: Substitute the actual date in the file name. Note: In Common Log Format, a timestamp will look like [06/Feb/2016:23:12:57 +0000]. The "57" part is the "seconds" part of the timestamp.
Fix: F-44043r674296_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to the <Valve className="org.apache.catalina.valves.AccessLogValve"> node. Set the 'pattern' setting with "%h %l %u %t "%r" %s %b". Note: The <Valve> node should be configured per the following: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001889
- Version
- VRAU-TC-000780
- Vuln IDs
-
- V-240852
- V-90133
- Rule IDs
-
- SV-240852r879748_rule
- SV-100783
Checks: C-44085r854861_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vco/app-server/localhost_access_log.txt If the timestamp does not contain a minimum granularity of one second, this is a finding. Note: In Common Log Format, a timestamp will look like [06/Feb/2016:23:12:57 +0000]. The "57" part is the "seconds" part of the timestamp.
Fix: F-44044r674299_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to the <Valve className="org.apache.catalina.valves.AccessLogValve"> node. Set the "pattern" setting with "%h %l %u %t "%r" %s %b". Note: The <Valve> node should be configured per the following: <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="localhost_access_log." suffix=".txt"/>
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001889
- Version
- VRAU-TC-000785
- Vuln IDs
-
- V-240853
- V-90135
- Rule IDs
-
- SV-240853r879748_rule
- SV-100785
Checks: C-44086r854863_chk
At the command prompt, execute the following command: tail /storage/log/vmware/vcac/access_log.YYYY-MM-dd.txt If the timestamp does not contain a minimum granularity of one second, this is a finding. Note: Substitute the actual date in the file name. Note: In Common Log Format, a timestamp will look like [06/Feb/2016:23:12:57 +0000]. The "57" part is the "seconds" part of the timestamp.
Fix: F-44045r674302_fix
Navigate to and open /etc/vcac/server.xml. Navigate to the <Valve className="org.apache.catalina.valves.AccessLogValve"> node. Set the "pattern" setting with "%h %l %u %t "%r" %s %b". Note: The <Valve> node should be configured per the following: <Valve className="org.apache.catalina.valves.AccessLogValve" checkExists="true" directory="logs" pattern="%h %l %u %t "%r" %s %b" prefix="access_log" requestAttributesEnabled="true" rotatable="false" suffix=".txt"/>
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- VRAU-TC-000790
- Vuln IDs
-
- V-240854
- V-90137
- Rule IDs
-
- SV-240854r879753_rule
- SV-100787
Checks: C-44087r674304_chk
At the command prompt, execute the following command: ls -alR /opt/vmware/horizon/workspace /opt/vmware/horizon/workspace/webapps | grep -E '^-' | awk '$1 !~ /---$/ {print}' If the command produces any output, this is a finding.
Fix: F-44046r674305_fix
Remove all world permissions from any listed file with the following command: chmod -R o-rwx /opt/vmware/horizon/workspace /opt/vmware/horizon/workspace/webapps
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- VRAU-TC-000795
- Vuln IDs
-
- V-240855
- V-90139
- Rule IDs
-
- SV-240855r879753_rule
- SV-100789
Checks: C-44088r674307_chk
At the command prompt, execute the following command: ls -alR /usr/lib/vco/configuration/webapps | grep -E '^-' | awk '$1 !~ /---$/ {print}' If the command produces any output, this is a finding.
Fix: F-44047r674308_fix
Remove all world permissions from any listed file with the following command: chmod -R o-rwx /usr/lib/vco/configuration/webapps
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- VRAU-TC-000800
- Vuln IDs
-
- V-240856
- V-90141
- Rule IDs
-
- SV-240856r879753_rule
- SV-100791
Checks: C-44089r674310_chk
At the command prompt, execute the following commands: ls -alR /etc/vcac /usr/lib/vcac/server/webapps | grep -E '^-' | awk '$1 !~ /---$/ {print}' If the command produces any output, this is a finding.
Fix: F-44048r674311_fix
Remove all world permissions from any listed file with the following command: chmod -R o-rwx /etc/vcac /usr/lib/vcac/server/webapps
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- VRAU-TC-000805
- Vuln IDs
-
- V-240857
- V-90143
- Rule IDs
-
- SV-240857r879756_rule
- SV-100793
Checks: C-44090r854868_chk
At the command prompt, execute the following command: cat /opt/vmware/horizon/workspace/conf/catalina.properties | grep -E '\.port' Review the listed ports. Verify that they match the list below of tc Server HORIZON ports. base.shutdown.port=-1 base.jmx.port=6969 bio-ssl.https.port=6443 If the displayed ports do not match the above list of ports, this is a finding.
Fix: F-44049r674314_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/catalina.properties. Navigate to the ports specification section. Set the tc Server HORIZON port specifications according to the list below: base.shutdown.port=-1 base.jmx.port=6969 bio-ssl.https.port=6443
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- VRAU-TC-000810
- Vuln IDs
-
- V-240858
- V-90145
- Rule IDs
-
- SV-240858r879756_rule
- SV-100795
Checks: C-44091r854870_chk
At the command prompt, execute the following command: cat /etc/vco/app-server/catalina.properties | grep -E '\.port' Review the listed ports. Verify that they match the list below of tc Server VCO ports. ch.dunes.http-server.port=8280 ch.dunes.https-server.port=8281 If the displayed ports do not match the above list of ports, this is a finding.
Fix: F-44050r674317_fix
Navigate to and open /etc/vco/app-server/catalina.properties. Navigate to the ports specification section. Set the tc Server VCO port specifications according to the list below: ch.dunes.http-server.port=8280 ch.dunes.https-server.port=8281
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- VRAU-TC-000815
- Vuln IDs
-
- V-240859
- V-90147
- Rule IDs
-
- SV-240859r879756_rule
- SV-100797
Checks: C-44092r854872_chk
At the command prompt, execute the following command: cat /etc/vcac/catalina.properties | grep -E '\.port' Review the listed ports. Verify that they match the list below of tc Server VCAC ports. base.shutdown.port=-1 base.jmx.port=6969 ajp.http.port=8009 ajp.https.port=8443 If the displayed ports do not match the above list of ports, this is a finding.
Fix: F-44051r674320_fix
Navigate to and open /etc/vcac/catalina.properties. Navigate to the ports specification section. Set the tc Server VCAC port specifications according to the list below: base.shutdown.port=-1 base.jmx.port=6969 ajp.http.port=8009 ajp.https.port=8443
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- VRAU-TC-000820
- Vuln IDs
-
- V-240860
- V-90149
- Rule IDs
-
- SV-240860r879944_rule
- SV-100799
Checks: C-44093r854874_chk
If the system is not implemented to process compartmentalized information, this requirement is Not Applicable. At the command prompt, execute the following command: grep bio-ssl.cipher.list /opt/vmware/horizon/workspace/conf/catalina.properties If the value of "bio-ssl.cipher.list" does not match the list of NSA Suite A ciphers or is missing, this is a finding.
Fix: F-44052r674323_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/catalina.properties. Navigate to the "bio-ssl.cipher.list" setting. Configure "bio-ssl.cipher.list" with a list of NSA Suite A ciphers.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- VRAU-TC-000825
- Vuln IDs
-
- V-240861
- V-90151
- Rule IDs
-
- SV-240861r879944_rule
- SV-100801
Checks: C-44094r854876_chk
If the system is not implemented to process compartmentalized information, this requirement is Not Applicable. At the command prompt, execute the following command: grep cipher /etc/vcac/catalina.properties If the value of "cipher" does not match the list of NSA Suite A ciphers or is missing, this is a finding.
Fix: F-44053r674326_fix
Navigate to and open /etc/vcac/catalina.properties. Navigate to and locate "cipher". Configure the "cipher" with NSA Suite A ciphers.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- VRAU-TC-000840
- Vuln IDs
-
- V-240862
- V-90153
- Rule IDs
-
- SV-240862r879806_rule
- SV-100803
Checks: C-44095r674328_chk
At the command prompt, execute the following command: grep base.shutdown.port /opt/vmware/horizon/workspace/conf/catalina.properties If the value of "base.shutdown.port" is not set to "-1" or is missing, this is a finding.
Fix: F-44054r674329_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/catalina.properties. Navigate to the "base.shutdown.port" setting. Add the setting "base.shutdown.port=-1" to the "catalina.properties" file.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- VRAU-TC-000845
- Vuln IDs
-
- V-240863
- V-90155
- Rule IDs
-
- SV-240863r879806_rule
- SV-100805
Checks: C-44096r674331_chk
At the command prompt, execute the following command: grep shutdown /etc/vco/app-server/server.xml If the value of "shutdown" is not set to "-1" or is missing, this is a finding.
Fix: F-44055r674332_fix
Navigate to and open /etc/vco/app-server/server.xml. Navigate to the <Server> node. Add the attribute 'port="-1"' to the <Server> node in the "server.xml" file.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- VRAU-TC-000850
- Vuln IDs
-
- V-240864
- V-90157
- Rule IDs
-
- SV-240864r879806_rule
- SV-100807
Checks: C-44097r674334_chk
At the command prompt, execute the following command: grep base.shutdown.port /etc/vcac/catalina.properties If the value of "base.shutdown.port" is not set to "-1" or is missing, this is a finding.
Fix: F-44056r674335_fix
Navigate to and open /etc/vcac/catalina.properties. Navigate to the "base.shutdown.port" setting. Add the setting "base.shutdown.port=-1" to the "catalina.properties" file.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- VRAU-TC-000860
- Vuln IDs
-
- V-240865
- V-90159
- Rule IDs
-
- SV-240865r928837_rule
- SV-100809
Checks: C-44098r674337_chk
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml Navigate to each of the <Connector> nodes. If the value of "sslProtocol" is not set to "TLS" or is missing, this is a finding.
Fix: F-44057r674338_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. Note: There are three <Connector> nodes. Configure each <Connector> nodes with the setting 'sslProtocol="TLS"'.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- VRAU-TC-000865
- Vuln IDs
-
- V-240866
- V-90161
- Rule IDs
-
- SV-240866r928837_rule
- SV-100811
Checks: C-44099r674340_chk
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. If the value of "sslProtocol" is not set to "TLS" or is missing, this is a finding.
Fix: F-44058r674341_fix
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. Configure the <Connector> node with the setting 'sslProtocol="TLS"'.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- VRAU-TC-000870
- Vuln IDs
-
- V-240867
- V-90163
- Rule IDs
-
- SV-240867r879810_rule
- SV-100813
Checks: C-44100r674343_chk
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. If the value of "sslProtocol" is not set to "TLS" or is missing, this is a finding.
Fix: F-44059r674344_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. Note: There are three <Connector> nodes. Configure each <Connector> nodes with the setting 'sslProtocol="TLS"'.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- VRAU-TC-000875
- Vuln IDs
-
- V-240868
- V-90165
- Rule IDs
-
- SV-240868r879810_rule
- SV-100815
Checks: C-44101r674346_chk
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. If the value of "sslProtocol" is not set to "TLS" or is missing, this is a finding.
Fix: F-44060r674347_fix
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. Configure the <Connector> node with the setting 'sslProtocol="TLS"'.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- VRAU-TC-000885
- Vuln IDs
-
- V-240869
- V-90167
- Rule IDs
-
- SV-240869r879810_rule
- SV-100817
Checks: C-44102r674349_chk
At the command prompt, execute the following command: grep useHttpOnly /opt/vmware/horizon/workspace/conf/context.xml If the value of "useHttpOnly" is not set to "true" or is missing, this is a finding.
Fix: F-44061r674350_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/context.xml. Navigate to the <Context> node. Add the 'useHttpOnly="true"' setting to the <Context> node. Note: The <Context> node should be configured per the following: <Context useHttpOnly="true">
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- VRAU-TC-000890
- Vuln IDs
-
- V-240870
- V-90169
- Rule IDs
-
- SV-240870r879810_rule
- SV-100819
Checks: C-44103r674352_chk
At the command prompt, execute the following command: grep useHttpOnly /etc/vco/app-server/context.xml If the value of "useHttpOnly" is not set to "true" or is missing, this is a finding.
Fix: F-44062r674353_fix
Navigate to and open /etc/vco/app-server/context.xml. Navigate to the <Context> node. Add the 'useHttpOnly="true"' setting to the <Context> node. Note: The <Context> node should be configured per the following: <Context useHttpOnly="true">
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- VRAU-TC-000895
- Vuln IDs
-
- V-240871
- V-90171
- Rule IDs
-
- SV-240871r879810_rule
- SV-100821
Checks: C-44104r674355_chk
At the command prompt, execute the following command: grep useHttpOnly /etc/vcac/context.xml If the value of "useHttpOnly" is not set to "true" or is missing, this is a finding.
Fix: F-44063r674356_fix
Navigate to and open /etc/vcac/context.xml. Navigate to the <Context> node. Add the 'useHttpOnly="true"' setting to the <Context> node. Note: The <Context> node should be configured per the following: <Context useHttpOnly="true">
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- VRAU-TC-000900
- Vuln IDs
-
- V-240872
- V-90173
- Rule IDs
-
- SV-240872r879810_rule
- SV-100823
Checks: C-44105r674358_chk
At the command prompt, execute the following command: grep -E '<secure>' /opt/vmware/horizon/workspace/conf/web.xml If the value of the <secure> node is not set to "true" or is missing, this is a finding.
Fix: F-44064r674359_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/web.xml. Navigate to the <session-config> node. Add the <cookie-config> --> <secure> node setting to the <session-config> node. Note: The <cookie-config> --> <secure> node should be configured per the following: <cookie-config> <secure>true</secure> </cookie-config>
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- VRAU-TC-000905
- Vuln IDs
-
- V-240873
- V-90175
- Rule IDs
-
- SV-240873r879810_rule
- SV-100825
Checks: C-44106r674361_chk
At the command prompt, execute the following command: grep -E '<secure>' /etc/vco/app-server/web.xml If the value of the <secure> node is not set to "true" or is missing, this is a finding.
Fix: F-44065r674362_fix
Navigate to and open /etc/vco/app-server/web.xml. Navigate to the <session-config> node. Add the <cookie-config> --> <secure> node setting to the <session-config> node. Note: The <cookie-config> --> <secure> node should be configured per the following: <cookie-config> <secure>true</secure> </cookie-config>
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- VRAU-TC-000910
- Vuln IDs
-
- V-240874
- V-90177
- Rule IDs
-
- SV-240874r879810_rule
- SV-100827
Checks: C-44107r674364_chk
At the command prompt, execute the following command: grep -E '<secure>' /etc/vcac/web.xml If the value of the <secure> node is not set to "true" or is missing, this is a finding.
Fix: F-44066r674365_fix
Navigate to and open /etc/vcac/web.xml. Navigate to the <session-config> node. Add the <cookie-config> --> <secure> node setting to the <session-config> node. Note: The <cookie-config> --> <secure> node should be configured per the following: <cookie-config> <secure>true</secure> </cookie-config>
- RMF Control
- SC-8
- Severity
- H
- CCI
- CCI-002418
- Version
- VRAU-TC-000915
- Vuln IDs
-
- V-240875
- V-90179
- Rule IDs
-
- SV-240875r879810_rule
- SV-100829
Checks: C-44108r674367_chk
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. If the value of "sslEnabledProtocols" is not set to "TLSv1.2,TLSv1.1,TLSv1" or is missing, this is a finding.
Fix: F-44067r674368_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. Note: There are three <Connector> nodes. Configure each <Connector> node with the setting 'sslEnabledProtocols="TLSv1.2,TLSv1.1,TLSv1"'.
- RMF Control
- SC-8
- Severity
- H
- CCI
- CCI-002418
- Version
- VRAU-TC-000920
- Vuln IDs
-
- V-240876
- V-90181
- Rule IDs
-
- SV-240876r879810_rule
- SV-100831
Checks: C-44109r674370_chk
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. If the value of "sslEnabledProtocols" is not set to "TLSv1.2,TLSv1.1,TLSv1" or is missing, this is a finding.
Fix: F-44068r674371_fix
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. Configure the <Connector> node with the setting 'sslEnabledProtocols="TLSv1.2,TLSv1.1,TLSv1"'.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- VRAU-TC-000925
- Vuln IDs
-
- V-240877
- V-90183
- Rule IDs
-
- SV-240877r879810_rule
- SV-100833
Checks: C-44110r674373_chk
At the command prompt, execute the following command: grep bio-ssl.cipher.list /opt/vmware/horizon/workspace/conf/catalina.properties If any export ciphers are listed, this is a finding.
Fix: F-44069r674374_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/catalina.properties. Navigate to the "bio-ssl.cipher.list" setting. Remove any export ciphers from "bio-ssl.cipher.list". Note: To view a list of export ciphers, at the command prompt execute the following command: openssl ciphers 'EXP'
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- VRAU-TC-000930
- Vuln IDs
-
- V-240878
- V-90185
- Rule IDs
-
- SV-240878r879810_rule
- SV-100835
Checks: C-44111r674376_chk
At the command prompt, execute the following command: grep ciphers /etc/vcac/catalina.properties If any export ciphers are listed, this is a finding.
Fix: F-44070r674377_fix
Navigate to and open /etc/vcac/catalina.properties. Navigate to the "cipher" setting. Remove any export ciphers from "cipher". Note: To view a list of export ciphers, at the command prompt execute the following command: openssl ciphers 'EXP'
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002422
- Version
- VRAU-TC-000940
- Vuln IDs
-
- V-240879
- V-90187
- Rule IDs
-
- SV-240879r879813_rule
- SV-100837
Checks: C-44112r674379_chk
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. If the value of "sslEnabledProtocols" is not set to "TLSv1.2,TLSv1.1,TLSv1" or is missing, this is a finding.
Fix: F-44071r674380_fix
Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml. Navigate to each of the <Connector> nodes. Note: There are three <Connector> nodes. Configure each <Connector> node with the setting 'sslEnabledProtocols="TLSv1.2,TLSv1.1,TLSv1"'.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002422
- Version
- VRAU-TC-000945
- Vuln IDs
-
- V-240880
- V-90189
- Rule IDs
-
- SV-240880r879813_rule
- SV-100839
Checks: C-44113r674382_chk
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. If the value of "sslEnabledProtocols" is not set to "TLSv1.2,TLSv1.1,TLSv1" or is missing, this is a finding.
Fix: F-44072r674383_fix
Navigate to and open /etc/vcac/server.xml. Navigate to the <Connector> node. Configure the <Connector> node with the setting 'sslEnabledProtocols="TLSv1.2,TLSv1.1,TLSv1"'.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- VRAU-TC-000950
- Vuln IDs
-
- V-240881
- V-90191
- Rule IDs
-
- SV-240881r879827_rule
- SV-100841
Checks: C-44114r854897_chk
Interview the ISSO. Review the policies and procedures used to ensure that all security-related upgrades are being installed within the configured time period directed by an authoritative source. If all security-related upgrades are not being installed within the configured time period directed by an authoritative source, this is a finding.
Fix: F-44073r674386_fix
Ensure that patches and updates from an authoritative source are applied at least within 24 hours after they have been received.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- VRAU-TC-000960
- Vuln IDs
-
- V-240882
- V-90193
- Rule IDs
-
- SV-240882r879887_rule
- SV-100843
Checks: C-44115r674467_chk
Interview the ISSO. Verify that this Security Technical Implementation Guide (STIG) is the most current STIG available for tc Server on vRA. Assess all of the organization's vRA installations to ensure that they are fully compliant with the most current tc Server STIG. If the most current version of the tc Server was not used, or if the tc Server configuration is not compliant with the most current tc Server STIG, this is a finding.
Fix: F-44074r674389_fix
Obtain the most current tc Server ALL STIG. Verify that tc Server ALL is configured with all current requirements.
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- VRAU-TC-009999
- Vuln IDs
-
- V-258454
- Rule IDs
-
- SV-258454r928887_rule
Checks: C-62194r928886_chk
vRealize Automation 7.x tc Server is no longer supported by the vendor. If the system is running vRealize Automation 7.x tc Server, this is a finding.
Fix: F-53958r798705_fix
Upgrade to a supported version.