VMware vRealize Automation 7.x vIDM Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- VRAU-VI-000020
- Vuln IDs
-
- V-240969
- V-90283
- Rule IDs
-
- SV-240969r879521_rule
- SV-100933
Checks: C-44202r676166_chk
At the command prompt, execute the following command: grep log4j.appender.rollingFile.file /usr/local/horizon/conf/saas-log4j.properties If the "log4j.appender.rollingFile.file" is not set to "/opt/vmware/horizon/workspace/logs/horizon.log" or is commented out or is missing, this is a finding.
Fix: F-44161r676167_fix
Navigate to and open /usr/local/horizon/conf/saas-log4j.properties. Configure the vIDM policy log file with the following lines: log4j.appender.rollingFile=org.apache.log4j.RollingFileAppender log4j.appender.rollingFile.MaxFileSize=50MB log4j.appender.rollingFile.MaxBackupIndex=7 log4j.appender.rollingFile.Encoding=UTF-8 log4j.appender.rollingFile.file=/opt/vmware/horizon/workspace/logs/horizon.log log4j.appender.rollingFile.append=true log4j.appender.rollingFile.layout=org.apache.log4j.PatternLayout log4j.appender.rollingFile.layout.ConversionPattern=%d{ISO8601} %-5p (%t) [%X{orgId};%X{userId};%X{ip}] %c - %m%n
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- VRAU-VI-000195
- Vuln IDs
-
- V-240970
- V-90285
- Rule IDs
-
- SV-240970r879589_rule
- SV-100935
Checks: C-44203r676169_chk
Interview the ISSO. Obtain the correct configuration for the site's Directory services. In a browser, log in with Tenant admin privileges and navigate to the Administration page. Select Directories Management >> Directories. Click on the configured Directory to review the configuration. If the Directory service is not configured correctly, this is a finding.
Fix: F-44162r676170_fix
Interview the ISSO. Obtain the correct configuration for the site's Directory services. In a browser, log in with Tenant admin privileges, and navigate to the Administration page. Select Directories Management >> Directories. Click on the configured Directory to edit the configuration in accordance with the instructions provided by the ISSO.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000197
- Version
- VRAU-VI-000240
- Vuln IDs
-
- V-240971
- V-90287
- Rule IDs
-
- SV-240971r879609_rule
- SV-100937
Checks: C-44204r676172_chk
In a browser, log in with Tenant admin privileges, and navigate to the Administration page. Select Directories Management >> Directories. Click on the configured Directory to review the configuration. If the SSL checkbox is not selected, this is a finding. Note: The checkbox is labeled, "This Directory requires all connections to use SSL".
Fix: F-44163r676173_fix
In a browser, log in with Tenant admin privileges, and navigate to the Administration page. Select Directories Management >> Directories. Click on the configured Directory to review the configuration. Check the checkbox that is labeled, "This Directory requires all connections to use SSL". Click "Save".
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- VRAU-VI-000315
- Vuln IDs
-
- V-240972
- V-90289
- Rule IDs
-
- SV-240972r879640_rule
- SV-100939
Checks: C-44205r676175_chk
Interview the ISSO. Obtain the correct configuration for clustering used by the site. Review the vRealize Automation appliance's installation, environment, and configuration. Determine if vRA clustering has been correctly implemented. If vRA is not correctly implementing clustering, this is a finding.
Fix: F-44164r676176_fix
Interview the ISSO. Obtain the correct configuration for clustering used by the site. Configure vRealize Automation to be in compliance with the clustering design provided by the ISSO.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- VRAU-VI-000340
- Vuln IDs
-
- V-240973
- V-90291
- Rule IDs
-
- SV-240973r879655_rule
- SV-100941
Checks: C-44206r676178_chk
At the command prompt, execute the following command: grep log4j.appender.rollingFile.file /usr/local/horizon/conf/saas-log4j.properties If the "log4j.appender.rollingFile.file" is not set to "/opt/vmware/horizon/workspace/logs/horizon.log" or is commented out or is missing, this is a finding.
Fix: F-44165r676179_fix
Navigate to and open /usr/local/horizon/conf/saas-log4j.properties. Configure the vIDM policy log file with the following lines: log4j.appender.rollingFile=org.apache.log4j.RollingFileAppender log4j.appender.rollingFile.MaxFileSize=50MB log4j.appender.rollingFile.MaxBackupIndex=7 log4j.appender.rollingFile.Encoding=UTF-8 log4j.appender.rollingFile.file=/opt/vmware/horizon/workspace/logs/horizon.log log4j.appender.rollingFile.append=true log4j.appender.rollingFile.layout=org.apache.log4j.PatternLayout log4j.appender.rollingFile.layout.ConversionPattern=%d{ISO8601} %-5p (%t) [%X{orgId};%X{userId};%X{ip}] %c - %m%n
- RMF Control
- SC-5
- Severity
- H
- CCI
- CCI-002385
- Version
- VRAU-VI-000550
- Vuln IDs
-
- V-240974
- V-90293
- Rule IDs
-
- SV-240974r879806_rule
- SV-100943
Checks: C-44207r676181_chk
If vRA is not installed in a MAC I system, this is Not Applicable. Interview the ISSO. Obtain the correct configuration for clustering used by the site. Review the vRealize Automation appliance's installation, environment, and configuration. Determine if vRA clustering has been correctly implemented. If vRA is not correctly implementing clustering, this is a finding.
Fix: F-44166r676182_fix
If vRA is not installed in a MAC I system, this is Not Applicable. Interview the ISSO. Obtain the correct configuration for clustering used by the site. Configure vRealize Automation to be in compliance with the clustering design provided by the ISSO.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- VRAU-VI-000655
- Vuln IDs
-
- V-240975
- V-90295
- Rule IDs
-
- SV-240975r879887_rule
- SV-100945
Checks: C-44208r676184_chk
Obtain the current vRealize Automation STIGs from the ISSO. Verify that this STIG is the most current STIG available for vRealize Automation. Assess all of the organization's vRA installations to ensure that they are fully compliant with the most current STIG. If the most current version of the vRA STIG was not used, or if the vRA appliance configuration is not compliant with the most current STIG, this is a finding.
Fix: F-44167r676185_fix
Obtain the most current vRealize Automation STIG. Verify that this vRA appliance is configured with all current requirements.
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- VRAU-VI-009999
- Vuln IDs
-
- V-258456
- Rule IDs
-
- SV-258456r928891_rule
Checks: C-62196r928890_chk
vRealize Automation 7.x vIDM is no longer supported by the vendor. If the system is running vRealize Automation 7.x vIDM, this is a finding.
Fix: F-53958r798705_fix
Upgrade to a supported version.