VMware vRealize Operations Manager 6.x Application Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +6 −5
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 6
- V-239840 Medium The vRealize Operations server must use an enterprise user management system to uniquely identify and authenticate users (or processes acting on behalf of organizational users).
- V-239841 Medium The vRealize Operations server session timeout must be configured.
- V-239842 Medium The vRealize Operations server must be configured to perform complete application deployments.
- V-239843 Medium The vRealize Operations server must only allow the use of DoD PKI-established certificate authorities for verification of the establishment of protected sessions.
- V-239844 Medium The vRealize Operations appliance must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
- V-258457 High The version of vRealize Operations Manager 6.x Application running on the system must be a supported version.
Removed rules 5
- V-88205 Medium The vRealize Operations server must use an enterprise user management system to uniquely identify and authenticate users (or processes acting on behalf of organizational users).
- V-88207 Medium The vRealize Operations server session timeout must be configured.
- V-88209 Medium The vRealize Operations server must be configured to perform complete application deployments.
- V-88211 Medium The vRealize Operations server must only allow the use of DoD PKI-established certificate authorities for verification of the establishment of protected sessions.
- V-88213 Medium The vRealize Operations appliance must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- VROM-AP-000195
- Vuln IDs
-
- V-239840
- V-88205
- Rule IDs
-
- SV-239840r879589_rule
- SV-98855
Checks: C-43073r664012_chk
Obtain the site configuration control policy from the ISSO. Review site procedures to determine if an enterprise management system is used to uniquely identify and authenticate users. If an enterprise management solution is not used, this is a finding.
Fix: F-43032r664013_fix
Configure vROps to use an enterprise user management system and document this in the site configuration control policy.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001185
- Version
- VROM-AP-000295
- Vuln IDs
-
- V-239841
- V-88207
- Rule IDs
-
- SV-239841r879637_rule
- SV-98857
Checks: C-43074r664015_chk
Verify that the session timeout is set to "15" minutes with the following steps: 1. Log on to the admin UI as the administrator. 2. Navigate to "Global Settings". 3. Review the session timeout value in mins. If the "Session Timeout:" setting is not "15" minutes, this is a finding.
Fix: F-43033r664016_fix
To edit the session timeout, use the following steps: 1. Log on to the admin UI as the administrator. 2. Navigate to "Global Settings". 3. Select "Edit Global Settings". 4. Set the "Session Timeout:" setting to "15" minutes. 5. Select "OK".
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- VROM-AP-000315
- Vuln IDs
-
- V-239842
- V-88209
- Rule IDs
-
- SV-239842r879640_rule
- SV-98859
Checks: C-43075r664018_chk
Obtain the site configuration control policy from the ISSO. Review site procedures to determine if a site policy exists to verify vROps installation after release into a production environment. The site policy should ensure that the installation was a complete application deployment before users are allowed to conduct business. If a site policy does not exist or is not being followed, this is a finding.
Fix: F-43034r664019_fix
Develop a site configuration control policy to ensure deployments are completed before allowing users to use the production environment.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-002470
- Version
- VROM-AP-000540
- Vuln IDs
-
- V-239843
- V-88211
- Rule IDs
-
- SV-239843r879798_rule
- SV-98861
Checks: C-43076r664021_chk
Verify that the vROps Single Sign-On (SSO) is configured with the correct authentication source only (DoD PKI CAC enabled vSphere SSO instance) by using the following steps: 1. Log on to the admin UI as the administrator. 2. In the menu, click Administration, and then in the left pane click Access >> Authentication Sources. 3. Review the authentication sources and ensure that only the DoD PKI CAC enabled vSphere SSO instance is available as an authentication source. If there is no authentication source, or multiple non-DoD PKI CAC enabled vSphere SSO instance authentication sources exist, this is a finding.
Fix: F-43035r664022_fix
Configure vROps Single Sign-On (SSO) with the following steps: 1. Log on to vRealize Operations Manager as an administrator. 2. In the menu, click Administration, and then in the left pane click Access >> Authentication Sources. 3. Click "Add". 4. In the Add Source for User and Group Import dialog box, provide information for the single sign-on source. 5. Click "Test" to test the source connection. 6. Click "OK". The certificate details are displayed. 7. Select the "Accept this Certificate" check box. 8. Click "OK". 9. In the "Import User Groups" dialog box, import user accounts from an SSO server on another machine. 10. In the list of user groups displayed, select at least one user group. 11. Click "Next". 12. In the "Roles and Objects" pane, select a role from the "Select Role" drop-down menu. 13. Select the "Assign this role to the group" check box. 14. Select the "objects" users of the group can access when holding this role. To assign permissions so that users can access all the objects in vRealize Operations Manager: 1. Select the "Allow access to all objects in the system" check box. 2. Click "OK". Note: For complete details review vROps 6.x and vSphere SSO product documentation.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- VROM-AP-000655
- Vuln IDs
-
- V-239844
- V-88213
- Rule IDs
-
- SV-239844r879887_rule
- SV-98863
Checks: C-43077r664024_chk
Obtain the current vRealize Operations STIGs from the ISSO. Verify that this Security Technical Implementation Guide (STIG) is the most current STIG available for vRealize Operations. Assess all of the organization's vROps installations to ensure that they are fully compliant with the most current STIG. If the most current version of the vROps STIG was not used, or if the vROps appliance configuration is not compliant with the most current STIG, this is a finding.
Fix: F-43036r664025_fix
Obtain the most current vRealize Operations STIG. Ensure that this vROps appliance is configured with all current requirements.
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- VROM-AP-009999
- Vuln IDs
-
- V-258457
- Rule IDs
-
- SV-258457r928893_rule
Checks: C-62197r928892_chk
vRealize Operations Manager 6.x Application is no longer supported by the vendor. If the system is running vRealize Operations Manager 6.x Application, this is a finding.
Fix: F-53958r798705_fix
Upgrade to a supported version.