Select any two versions of this STIG to compare the individual requirements
Select any old version/release of this STIG to view the previous requirements
Check the Cassandra Server settings to determine whether users are restricted from accessing objects and data they are not authorized to access. At the command prompt, execute the following command: # grep '^\s*authorizer:' /usr/lib/vmware-vcops/user/conf/cassandra/cassandra.yaml If the line below is returned, this is a finding: authorizer: AllowAllAuthorizer
Configure the Cassandra Server settings and access controls to permit user access only to objects and data that the user is authorized to view or interact with, and to prevent access to all other objects and data. At the command line execute the following command: # sed -i 's/^.*\bauthorizer:.*$/authorizer: CassandraAuthorizer/' /usr/lib/vmware-vcops/user/conf/cassandra/cassandra.yaml
Check the Cassandra Server auditing settings to determine whether organization-defined auditable events are being audited by the system. At the command prompt, execute the following command: # grep '<root' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml If level is not set to "ALL", this is a finding.
Configure the Cassandra Server to generate audit records for at least the DoD minimum set of events. At the command line execute the following command: # sed -i 's/^\(\s*\)<root level=".*">\(\s*\)$/\1<root level="ALL">\2/' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml
Check the Cassandra Server settings and documentation to determine whether designated personnel are able to select which auditable events are being audited. At the command prompt, execute the following command: # ls -al /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml If the permissions are not "0640", this is a finding.
Configure the Cassandra Server settings to allow designated personnel to select which auditable events are audited. At the command line execute the following command: # chmod 0640 /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml
Review the Cassandra Server settings to ensure that audit records can be produced when privileges/permissions/role memberships are retrieved. At the command prompt, execute the following command: # grep '<root' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml If level is not set to "ALL", this is a finding.
Configure the Cassandra Server to produce audit records when privileges/permissions/role memberships are retrieved. At the command line execute the following command: # sed -i 's/^\(\s*\)<root level=".*">\(\s*\)$/\1<root level="ALL">\2/' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml
Review the Cassandra Server settings to ensure that audit records can be produced when the system denies or fails to complete attempts to retrieve privileges/permissions/role membership. At the command prompt, execute the following command: # grep '<root' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml If level is not set to "ALL", this is a finding.
Configure the Cassandra Server to produce audit records when other errors prevent access to privileges/permissions/role membership. At the command line execute the following command: # sed -i 's/^\(\s*\)<root level=".*">\(\s*\)$/\1<root level="ALL">\2/' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml
Review the Cassandra Server configuration to ensure session auditing is initiated upon startup. At the command prompt, execute the following command: # grep '<root' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml If level is not set to "ALL", this is a finding.
Configure the Cassandra Server to initiate session auditing upon startup. At the command line execute the following command: # sed -i 's/^\(\s*\)<root level=".*">\(\s*\)$/\1<root level="ALL">\2/' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml
Review the Cassandra Server settings to ensure audit records containing sufficient information to establish what type of events occurred are produced. Navigate to and open /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml. Navigate to the <appender> node with the name="FILE" attribute. Navigate to <encoder> node. If the <pattern> node does not look like the expected result, this is a finding. Expected result: <pattern>%-5level [%thread] %date{ISO8601, UTC} %F:%L - %msg%n</pattern>
Configure the Cassandra Server to produce audit records containing sufficient information to establish what type of events occurred. Navigate to and open /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml. Navigate to the <appender> node with the name="FILE" attribute. Navigate to <encoder> node. Edit the <pattern> to look like the below. <pattern>%-5level [%thread] %date{ISO8601, UTC} %F:%L - %msg%n</pattern>
Review the Cassandra Server setting to ensure audit records containing time stamps to establish when the events occurred are produced. Navigate to and open /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml. Navigate to the <appender> node with the name="FILE" attribute. Navigate to <encoder> node. If the <pattern> node does not look like the expected result, this is a finding. Expected result: <pattern>%-5level [%thread] %date{ISO8601, UTC} %F:%L - %msg%n</pattern>
Configure the Cassandra Server to produce audit records containing time stamps to establish when the events occurred. Navigate to and open /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml. Navigate to the <appender> node with the name="FILE" attribute. Navigate to <encoder> node. Edit the <pattern> to look like the below. <pattern>%-5level [%thread] %date{ISO8601, UTC} %F:%L - %msg%n</pattern>
Review the Cassandra Server settings to ensure audit records containing sufficient information to establish the outcome (success or failure) of the events are produced. At the command prompt, execute the following command: # grep '<root' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml If level is not set to "ALL", this is a finding.
Configure the Cassandra Server to produce audit records containing sufficient information to establish the outcome (success or failure) of the events. At the command line execute the following command: # sed -i 's/^\(\s*\)<root level=".*">\(\s*\)$/\1<root level="ALL">\2/' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml
Review the Cassandra Server settings to ensure additional, more detailed, organization-defined information in the audit records for audit events identified by type, location, or subject are included. At the command prompt, execute the following command: # grep '<root' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml If level is not set to "ALL", this is a finding.
Configure the Cassandra Server to include additional, more detailed, organization-defined information in the audit records for audit events identified by type, location, or subject. At the command line execute the following command: # sed -i 's/^\(\s*\)<root level=".*">\(\s*\)$/\1<root level="ALL">\2/' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml
Review the Cassandra Server settings to ensure logs are protected from unauthorized read access. At the command prompt, execute the following command: # ls -lL /storage/log/vcops/log/cassandra If any file does not have permissions of "0640", this is a finding.
Configure the Cassandra Server logs to be protected from unauthorized read access. At the command prompt, execute the following command: # chmod 0640 /storage/log/vcops/log/cassandra/<file> Replace <file> with any file with incorrect permissions.
Review the Cassandra Server to ensure logs have the correct owner. At the command prompt, execute the following command: # ls -lL /storage/log/vcops/log/cassandra If any file is not owned by "admin", this is a finding.
Configure the Cassandra Server logs to have the correct owner. At the command prompt, execute the following command: # chown admin /storage/log/vcops/log/cassandra/<file> Replace <file> with any file that has the incorrect owner.
Review the Cassandra Server settings to ensure logs have the correct group-owner. At the command prompt, execute the following command: # ls -lL /storage/log/vcops/log/cassandra If any file is not group-owned by "admin", this is a finding.
Configure the Cassandra Server logs to have the correct group-owner. At the command prompt, execute the following command: # chown admin /storage/log/vcops/log/cassandra/<file> Replace <file> with any file that has the incorrect group-owner.
Review the Cassandra Server settings to ensure the log configuration file is protected from unauthorized read access. At the command prompt, execute the following command: # ls -l /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml If the file does not have permissions of "0640", this is a finding.
Configure the Cassandra Server log configuration file to be protected from unauthorized read access. At the command prompt, execute the following command: # chmod 0640 /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml
Review the Cassandra Server settings to ensure the log configuration file has the correct owner. At the command prompt, execute the following command: # ls -l /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml If the file is not owned by "admin", this is a finding.
Configure the Cassandra Server log configuration file to have the correct owner. At the command prompt, execute the following command: # chown admin /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml
Review the Cassandra Server settings to ensure the log configuration file has the correct group-owner. At the command prompt, execute the following command: # ls -l /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml If the file is not group-owned by "admin", this is a finding.
Configure the Cassandra Server log configuration file to have the correct group-owner. At the command prompt, execute the following command: # chown admin /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml
Review the Cassandra Server Configuration to ensure its software, including configuration files, is stored in dedicated directories, or direct-access storage device (DASD) pools, separate from the host OS and other applications. Run following commands from Cassandra host server console: "cd $VCOPS_BASE/Cassandra/<installed Cassandra release name (current example - apache-cassandra-2.1.8)> ls -l" If the Cassandra software, including configuration files, is not stored separate from the host OS and other applications, this is a finding.
Configure the Cassandra Server software, including configuration files, to be stored in dedicated directories, or direct-access storage device (DASD) pools, separate from the host OS and other applications. Install all applications on directories separate from the DBMS software library directory. Relocate any directories or reinstall other application software that currently shares the DBMS software library directory.
Review system documentation to identify accounts authorized to own database objects. Review accounts that own objects in the database(s). If any database objects are found to be owned by users not authorized to own database objects, this is a finding. Open cqlsh prompt in the Cassandra Server and type "LIST ALL PERMISSIONS;" command. Review the list of access privileges available. If all the objects are owned by superuser account (cassandra in default Cassandra Server configuration), this is not a finding. Otherwise, it is a finding.
Assign ownership of authorized objects to authorized object owner accounts. Open cqlsh prompt in the Cassandra Server and run "REVOKE <list of permissions> ON <tablename> FROM <current owner user account name>; GRANT ALL PERMISSIONS ON <tablename> TO <superuser account name>;"
Review the Cassandra Server settings to ensure the role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to the DBMS, etc.) are restricted to authorized users. At the command prompt, execute the following command: # find /usr/lib/vmware-vcops/cassandra -type f ! \( -user admin -o -user root \) If any files are listed that are not owned by either "admin" or "root", this is a finding.
Configure the Cassandra Server to restrict the role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to the DBMS, etc.) to authorized users. At the command line execute the following command: # chown root <file> Replace <file> with the files that are not owned by either "admin" or "root".
Review the Cassandra Server to ensure unused database components, software, and database objects are removed. Open console on server Cassandra DB is hosted on and run following command: "find / | grep "cassandra"". Review the list of files displayed. If no unused components or features are displayed, this is not a finding. Otherwise, this is a finding.
Uninstall unused components or features that are installed and can be uninstalled. Remove any database objects and applications that are installed to support them. Run the following command from Cassandra host server console: "rm –rf <path to the unused component directory>".
Obtain document containing the list of approved ports, protocols and services from https://disa.deps.mil/ext/cop/iase/ppsm/Pages/cal.aspx. Review the Cassandra Server database settings and local documentation for functions, ports, protocols, and services that are not approved. Open the console to the server Cassandra DB is hosted at and type: "find / | grep "cassandra.yaml"". Open cassandra.yaml and review "native_transport_port" parameter value. Run "netstat -ntl | grep <"native_transport_port" parameter value >" command from the console on the host. If protocol, port, and IP address Cassandra communicates on are not found in https://disa.deps.mil/ext/cop/iase/ppsm/Pages/cal.aspx, this is a finding.
Disable functions, ports, protocols, and services that are not part of https://disa.deps.mil/ext/cop/iase/ppsm/Pages/cal.aspx document, and as such are not approved. Modify "native_transport_port" and "rpc_address" values in "cassandra.yaml" file, to set them in the approved range (refer to https://disa.deps.mil/ext/cop/iase/ppsm/Pages/cal.aspx document).
Review the Cassandra Server configuration to ensure organizational users are uniquely identified and authenticated when logging on/connecting to the system. Open "cqlsh" prompt in the Cassandra Server and type in "LIST USERS;" command. Review the list of accounts available against product documentation and determine if any shared accounts exist. If accounts are determined to be shared, determine if individuals are first individually authenticated. If individuals are not individually authenticated before using the shared account, this is a finding.
Configure the Cassandra Server to uniquely identify and authenticate all organizational users who log on/connect to the system. Create identity-based account for all the users accessing database (CREATE USER IF NOT EXISTS <identity based username> WITH PASSWORD <password>) Build/configure applications to ensure successful individual authentication prior to shared account access.
Review the Cassandra database configuration to ensure the DoD standards for password complexity and lifetime are enforced. Review the DBMS settings relating to password complexity. Determine whether the following rules are enforced. If any are not, this is a finding. a. minimum of 15 characters, including at least one of each of the following character sets: - Upper-case - Lower-case - Numeric - Special characters (e.g., ~ ! @ # $ % ^ & * ( ) _ + = - ' [ ] / ? > <) b. Minimum number of characters changed from previous password: 50 percent of the minimum password length; that is, eight Review the DBMS settings relating to password lifetime. Determine whether the following rules are enforced. If any are not, this is a finding. c. Password lifetime limits: Minimum 24 hours, maximum 60 days d. Number of password changes before an old one may be reused: Minimum of five
Configure the Cassandra database to enforce the DoD standards for password complexity and lifetime. Use configuration parameters and/or custom code to enforce the following rules for passwords: a. minimum of 15 characters, including at least one of each of the following character sets: - Upper-case - Lower-case - Numeric - Special characters (e.g., ~ ! @ # $ % ^ & * ( ) _ + = - ' [ ] / ? > <) b. Minimum number of characters changed from previous password: 50 percent of the minimum password length; that is, eight c. Password lifetime limits: Minimum 24 hours, maximum 60 days d. Number of password changes before an old one may be reused: Minimum of five
Review configuration settings for encrypting passwords in transit across the network. If passwords are not encrypted, this is a finding. At the command prompt, execute the following command: # grep '^\s*internode_encryption:' /usr/lib/vmware-vcops/user/conf/cassandra/cassandra.yaml If the line below is returned, this is a finding: internode_encryption: all
Configure encryption for transmission of passwords across the network. If the database does not provide encryption for logon events natively, employ encryption at the OS or network level. At the command line execute the following command: # sed -i 's/^.*\binternode_encryption:.*$/internode_encryption: all/' /usr/lib/vmware-vcops/user/conf/cassandra/cassandra.yaml
Review the Cassandra Server configuration to ensure objects or code implementing security functionality are located in a separate security domain, such as a separate database or schema created specifically for security functionality. If security-related database objects or code are not kept separate, this is a finding. Open "cqlsh" prompt of Cassandra Server and run "LIST ALL PERMISSIONS" command from it. Review username resource and permissions columns. If for any of the objects under system, system_auth, or system_traces schemas privileges are given to any other users than a superuser (cassandra in default configuration), this is a finding.
Configure the Cassandra Server to isolate security functions from non-security functions. Locate security-related database objects and code in a separate database, schema, or other separate security domain from database objects and code implementing application logic. Using the "REVOKE" command, modify access privileges for objects in system, system_auth, and system_traces, revoking privileges of non-superuser users.
Review the permissions granted to users by the operating system/file system on the database files, database log files, and database backup files. At the command prompt, execute the following command: # find /storage/db/vcops/cassandra/data -type f ! \( -user admin -o -user root \) If any files are listed that are not owned by either "admin" or "root", this is a finding.
Configure the permissions granted by the operating system/file system on the database files, database log files, and database backup files so that only relevant system accounts and authorized system administrators and database administrators with a need to know are permitted to read/view these files. At the command line execute the following command: # chown root <file> Replace <file> with the files that are not owned by either "admin" or "root".
Review the Cassandra Server to ensure detailed error messages are only revealed to the ISSO, ISSM, SA and DBA. At the command prompt, execute the following command: # ls -l /usr/lib/vmware-vcops/user/conf/cassandra If any file is not owned by "admin", this is a finding.
Configure the Cassandra Server to only reveal detailed error messages to the ISSO, ISSM, SA and DBA. At the command prompt, execute the following command: # chown admin /usr/lib/vmware-vcops/user/conf/cassandra/<file> Replace <file> with any file not owned by "admin".
Review the Cassandra Server settings to ensure centralized management of the content captured in audit records generated by all components of the system are utilized. At the command prompt, execute the following command: # grep SyslogAppender /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml If level is not set to "ALL", this is a finding.
Configure the Cassandra Server to utilize centralized management of the content captured in audit records generated by all components of the system. Navigate to and open /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml. Navigate to the <configuration> node. Add the following <appender> node to the <configuration> node. <appender name="SYSLOG" class="ch.qos.logback.classic.net.SyslogAppender"> <syslogHost>syslogServerHostName</syslogHost> <facility>AUTH</facility> <suffixPattern>%-5level [%thread] %date{ISO8601, UTC} %F:%L - %msg%n </suffixPattern> </appender> Navigate to the <root> node. Add the following to the <root> node. <appender-ref ref="SYSLOG" />
Review the Cassandra Server settings to ensure time stamps, in audit records and application data that can be mapped to Coordinated Universal Time (UTC, formerly GMT) are recorded. Navigate to and open /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml. Navigate to the <appender> node with the name="FILE" attribute. Navigate to <encoder> node. If the <pattern> node does not look like the expected result, this is a finding. Expected result: <pattern>%-5level [%thread] %date{ISO8601, UTC} %F:%L - %msg%n</pattern>
Configure the Cassandra Server to record time stamps, in audit records and application data that can be mapped to Coordinated Universal Time (UTC, formerly GMT). Navigate to and open /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml. Navigate to the <appender> node with the name="FILE" attribute. Navigate to <encoder> node. Edit the <pattern> to look like the below. <pattern>%-5level [%thread] %date{ISO8601, UTC} %F:%L - %msg%n</pattern>
Review the Cassandra Server settings to ensure time stamps, for audit records and application data, with a minimum granularity of one second are generated. Navigate to and open /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml. Navigate to the <appender> node with the name="FILE" attribute. Navigate to <encoder> node. If the <pattern> node does not look like the expected result, this is a finding. Expected result: <pattern>%-5level [%thread] %date{ISO8601, UTC} %F:%L - %msg%n</pattern>
Configure the Cassandra Server to generate time stamps, for audit records and application data, with a minimum granularity of one second. Navigate to and open /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml. Navigate to the <appender> node with the name="FILE" attribute. Navigate to <encoder> node. Edit the <pattern> to look like the below. <pattern>%-5level [%thread] %date{ISO8601, UTC} %F:%L - %msg%n</pattern>
Review the Cassandra Server configuration to ensure the truststore file is protected. At the command prompt, execute the following command: # ls -l /storage/vcops/user/conf/ssl/tcserver.truststore If the file permissions are not "0640", this is a finding.
Configure the Cassandra Server to protect the truststore file. At the command line execute the following command: # chmod 0640 /storage/vcops/user/conf/ssl/tcserver.truststore
Review the Cassandra Server to ensure network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accordance with the Ports, Protocols, and Services Management (PPSM) guidance are disabled. Open the console to the server that Cassandra DB is hosted at and type: "find / | grep "cassandra.yaml"". Open "cassandra.yaml" file and review "start_rpc", "start_native_transport", and "native_transport_port" parameters values. If "start_rpc" is not set to "false" and "start_native_transport" is not set to "true", this is a finding. Run following command from the console of server, hosting Cassandra: "netstat -ntl | grep <native_transport_port > parameter value". Review output of this command record for the protocol and port Cassandra listens at. Obtain the document containing the list of approved ports, protocols, and services from https://disa.deps.mil/ext/cop/iase/ppsm/Pages/cal.aspx. If protocol and port Cassandra listens at are not approved, this is a finding.
Configure the Cassandra Server to disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accordance with the Ports, Protocols, and Services Management (PPSM) guidance. Open the console to the server that Cassandra DB is hosted at and type: "find / | grep "cassandra.yaml"". Open "cassandra.yaml" file and modify "start_rpc parameter" value to "false", "start_native_transport parameter" value to "true" and "native_transport_port" parameter value to one in the range of approved ports, according to https://disa.deps.mil/ext/cop/iase/ppsm/Pages/cal.aspx document (default port is 9042).
Review the Cassandra Server to ensure that it behaves in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received. Open the "cqlsh" prompt in the Cassandra Server and type "DESCRIBE KEYSPACES;". Type "DESCRIBE <keyspace name>" for all the keyspace names that have been displayed as output for the first command. Review keyspaces content. Open the console to the server that Cassandra DB is hosted at and type: "find / | grep "logback.xml"". Open "logback.xml" file and review "level" parameter value under <root />. If level is not set to "ALL", this is a finding.
Configure the Cassandra Server to behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received. Modify tables by adding constraints (CREATE TRIGGER IF NOT EXISTS <trigger_name> ON <table name>, where TRIGGER triggered validation event). Open console to the server, Cassandra DB is hosted at, and type: "find / | grep "logback.xml"". Open "logback.xml" file and set "level" parameter value under <root /> to "ALL".
Review the Cassandra Server configuration to ensure security-relevant software updates are installed within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs). Run "find / | grep "cassandra-"" from console and review all the Cassandra DB related packages currently installed on the host. Check at the http://cassandra.apache.org/download/ for the latest updates and patches available. Check product documentation for the time period updates have to be installed on the host. If there is an update that has to be installed, but is not displayed in the list of Cassandra DB related packages currently installed on the host, this is a finding.
Configure the Cassandra Server to install security-relevant software updates within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs). Install the latest updates according to the time period specified in product documentation. Verify that the Cassandra Server was configured to follow product documentation specified updates installation timeframe.
Review the Cassandra Server configuration to ensure audit records are generated when security objects are accessed. At the command prompt, execute the following command: # grep '<root' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml If level is not set to "ALL", this is a finding.
Configure the Cassandra Server to generate audit records when security objects are accessed. At the command line execute the following command: # sed -i 's/^\(\s*\)<root level=".*">\(\s*\)$/\1<root level="ALL">\2/' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml
Review the Cassandra Server configuration to ensure audit records are generated when unsuccessful attempts to access security objects occur. At the command prompt, execute the following command: # grep '<root' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml If level is not set to "ALL", this is a finding.
Configure the Cassandra Server to generate audit records when unsuccessful attempts to access security objects occur. At the command line execute the following command: # sed -i 's/^\(\s*\)<root level=".*">\(\s*\)$/\1<root level="ALL">\2/' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml
Review the Cassandra Server configuration to ensure audit records are generated when privileges/permissions are added. At the command prompt, execute the following command: # grep '<root' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml If level is not set to "ALL", this is a finding.
Configure the Cassandra Server to generate audit records when privileges/permissions are added. At the command line execute the following command: # sed -i 's/^\(\s*\)<root level=".*">\(\s*\)$/\1<root level="ALL">\2/' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml
Review the Cassandra Server configuration to ensure audit records are generated when unsuccessful attempts to add privileges/permissions occur. At the command prompt, execute the following command: # grep '<root' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml If level is not set to "ALL", this is a finding.
Configure the Cassandra Server to generate audit records when unsuccessful attempts to add privileges/permissions occur. At the command line execute the following command: # sed -i 's/^\(\s*\)<root level=".*">\(\s*\)$/\1<root level="ALL">\2/' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml
Review the Cassandra Server configuration to ensure audit records are generated when privileges/permissions are modified. At the command prompt, execute the following command: # grep '<root' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml If level is not set to "ALL", this is a finding.
Configure the Cassandra Server to generate audit records when privileges/permissions are modified. At the command line execute the following command: # sed -i 's/^\(\s*\)<root level=".*">\(\s*\)$/\1<root level="ALL">\2/' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml
Review the Cassandra Server configuration to ensure audit records are generated when unsuccessful attempts to modify privileges/permissions occur. At the command prompt, execute the following command: # grep '<root' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml If level is not set to "ALL", this is a finding.
Configure the Cassandra Server to generate audit records when unsuccessful attempts to modify privileges/permissions occur. At the command prompt, execute the following command: # grep '<root' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml
Review the Cassandra Server configuration to ensure audit records are generated when security objects are modified. At the command prompt, execute the following command: # grep '<root' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml If level is not set to "ALL", this is a finding.
Configure the Cassandra Server to generate audit records when security objects are modified. At the command line execute the following command: # sed -i 's/^\(\s*\)<root level=".*">\(\s*\)$/\1<root level="ALL">\2/' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml
Review the Cassandra Server configuration to ensure audit records are generated when unsuccessful attempts to modify security objects occur. Open console to the server, Cassandra DB is hosted at, and type: "find / | grep "logback.xml"". Open "logback.xml" file and review "level" parameter value under <root />. If level is not set to "ALL", this is a finding.
Configure the Cassandra Server to generate audit records when unsuccessful attempts to modify security objects occur. Open console to the server, Cassandra DB is hosted at, and type: "find / | grep "logback.xml"". Open "logback.xml" file and set "level" parameter value under <root /> to "ALL".
Review the Cassandra Server configuration to ensure audit records are generated when privileges/permissions are deleted. At the command prompt, execute the following command: # grep '<root' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml If level is not set to "ALL", this is a finding.
Configure the Cassandra Server to generate audit records when privileges/permissions are deleted. At the command line execute the following command: # sed -i 's/^\(\s*\)<root level=".*">\(\s*\)$/\1<root level="ALL">\2/' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml
Review the Cassandra Server configuration to ensure audit records are generated when unsuccessful attempts to delete privileges/permissions occur. At the command prompt, execute the following command: # grep '<root' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml If level is not set to "ALL", this is a finding.
Configure the Cassandra Server to generate audit records when unsuccessful attempts to delete privileges/permissions occur. At the command line execute the following command: # sed -i 's/^\(\s*\)<root level=".*">\(\s*\)$/\1<root level="ALL">\2/' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml
Review the Cassandra Server configuration to ensure audit records are generated when security objects are deleted. At the command prompt, execute the following command: # grep '<root' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml If level is not set to "ALL", this is a finding.
Configure the Cassandra Server to generate audit records when security objects are deleted. At the command line execute the following command: # sed -i 's/^\(\s*\)<root level=".*">\(\s*\)$/\1<root level="ALL">\2/' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml
Review the Cassandra Server configuration to ensure audit records are generated when unsuccessful attempts to delete security objects occur. At the command prompt, execute the following command: # grep '<root' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml If level is not set to "ALL", this is a finding.
Configure the Cassandra Server to generate audit records when unsuccessful attempts to delete security objects occur. At the command line execute the following command: # sed -i 's/^\(\s*\)<root level=".*">\(\s*\)$/\1<root level="ALL">\2/' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml
Review the Cassandra Server configuration to ensure audit records are generated when categories of information (e.g., classification levels/security levels) are deleted. At the command prompt, execute the following command: # grep '<root' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml If level is not set to "ALL", this is a finding.
Configure the Cassandra Server to generate audit records when categories of information (e.g., classification levels/security levels) are deleted. At the command line execute the following command: # sed -i 's/^\(\s*\)<root level=".*">\(\s*\)$/\1<root level="ALL">\2/' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml
Review the Cassandra Server configuration to ensure audit records are generated for all privileged activities or other system-level access. At the command prompt, execute the following command: # grep '<root' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml If level is not set to "ALL", this is a finding.
Configure the Cassandra Server to generate audit records for all privileged activities or other system-level access. At the command line execute the following command: # sed -i 's/^\(\s*\)<root level=".*">\(\s*\)$/\1<root level="ALL">\2/' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml
Review the Cassandra Server configuration to ensure audit records are generated when unsuccessful attempts to execute privileged activities or other system-level access occur. At the command prompt, execute the following command: # grep '<root' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml If level is not set to "ALL", this is a finding.
Configure the Cassandra Server to generate audit records when unsuccessful attempts to execute privileged activities or other system-level access occur. At the command line execute the following command: # sed -i 's/^\(\s*\)<root level=".*">\(\s*\)$/\1<root level="ALL">\2/' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml
Review the Cassandra Server configuration to ensure audit records are generated when successful accesses to objects occur. At the command prompt, execute the following command: # grep '<root' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml If level is not set to "ALL", this is a finding.
Configure the Cassandra Server to generate audit records when successful accesses to objects occur. At the command line execute the following command: # sed -i 's/^\(\s*\)<root level=".*">\(\s*\)$/\1<root level="ALL">\2/' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml
Review the Cassandra Server configuration to ensure audit records are generated when unsuccessful accesses to objects occur. At the command prompt, execute the following command: # grep '<root' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml If level is not set to "ALL", this is a finding.
Configure the Cassandra Server to generate audit records when unsuccessful accesses to objects occur. At the command line execute the following command: # sed -i 's/^\(\s*\)<root level=".*">\(\s*\)$/\1<root level="ALL">\2/' /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml
Review the Cassandra Server to ensure audit data is off-loaded to a separate log management facility. At the command prompt, execute the following command: # grep SyslogAppender /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml If level is not set to "ALL", this is a finding.
Configure the Cassandra Server to off-load audit data to a separate log management facility. Navigate to and open /usr/lib/vmware-vcops/user/conf/cassandra/logback.xml. Navigate to the <configuration> node. Add the following <appender> node to the <configuration> node. <appender name="SYSLOG" class="ch.qos.logback.classic.net.SyslogAppender"> <syslogHost>syslogServerHostName</syslogHost> <facility>AUTH</facility> <suffixPattern>%-5level [%thread] %date{ISO8601, UTC} %F:%L - %msg%n </suffixPattern> </appender> Navigate to the <root> node. Add the following to the <root> node. <appender-ref ref="SYSLOG" />
Review the Cassandra documentation and configuration to determine if the server is configured in accordance with DoD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, DTMs, and IAVMs. Obtain supporting documentation from the ISSO. Verify that this Security Technical Implementation Guide (STIG) is the most current STIG available for Cassandra on vROps. Assess all of the organization's vROps installations to ensure that they are fully compliant with the most current Cassandra STIG. If the Cassandra configuration is not compliant with the most current Cassandra STIG, this is a finding.
Configure the Cassandra server in accordance with DoD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, DTMs, and IAVMs.
Review the Cassandra Server configuration to ensure NIST FIPS 140-2 validated cryptographic modules are used for cryptographic operations. Review the Apache2 configuration by opening the /etc/apache2/ssl-global.conf file. Search for the <IfModule mod_ssl.c> line and ensure the SSLFIPS directive is below it. If the SSLFIPS directive is not under the <IfModule mod_ssl.c> line, this is a finding.
Configure the Cassandra Server to use NIST FIPS 140-2 validated cryptographic modules for cryptographic operations. To enable the FIPS mode of operation, complete the following steps: Replace the mod_ssl.so with the following command: cd /usr/lib64/apache2-prefork/ cp mod_ssl.so mod_ssl.so.old cp mod_ssl.so.FIPSON.openssl1.0.2 mod_ssl.so Modify your Apache2 configuration by editing the /etc/apache2/ssl-global.conf file. Search for the <IfModule mod_ssl.c> line and add the SSLFIPS on directive below it. Reset the Apache configuration with the service apache2 restart command.
Review the Cassandra Server configuration to protect the confidentiality and integrity of all information at rest. Inspect the server configuration to ensure a full disk encryption solution has been implemented. If the disk is unencrypted, this is a finding.
Configure the Cassandra Server to protect the confidentiality and integrity of all information at rest. Implement full disk encryption such as VMcrypt or other third-party full disk encryption that uses FIPS 140-2 validated cryptography.
Review the Cassandra Server to ensure cryptographic mechanisms are implemented preventing the unauthorized disclosure of organization-defined information at rest on organization-defined information system components. Inspect the server configuration to ensure a full disk encryption solution has been implemented. If the disk is unencrypted, this is a finding.
Configure the Cassandra Server to implement cryptographic mechanisms preventing the unauthorized disclosure of information at rest. Implement full disk encryption such as VMcrypt or other third-party full disk encryption that uses FIPS 140-2 validated cryptography.
vRealize Operations Manager Cassandra is no longer supported by the vendor. If the system is running vRealize Operations Manager Cassandra, this is a finding.
Upgrade to a supported version.