UCF STIG Viewer Logo

VMware vSphere 7.0 vCenter Appliance EAM Security Technical Implementation Guide


Overview

Date Finding Count (33)
2023-06-15 CAT I (High): 0 CAT II (Med): 33 CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-256688 Medium ESX Agent Manager must not have any symbolic links in the web content directory tree.
V-256689 Medium ESX Agent Manager directory tree must have permissions in an out-of-the-box state.
V-256684 Medium ESX Agent Manager must have Multipurpose Internet Mail Extensions (MIMEs) that invoke operating system shell programs disabled.
V-256685 Medium ESX Agent Manager must have mappings set for Java servlet pages.
V-256686 Medium ESX Agent Manager must not have the Web Distributed Authoring (WebDAV) servlet installed.
V-256687 Medium ESX Agent Manager must be configured with memory leak protection.
V-256680 Medium ESX Agent Manager application files must be verified for their integrity.
V-256681 Medium ESX Agent Manager must only run one webapp.
V-256682 Medium ESX Agent Manager must not be configured with unsupported realms.
V-256683 Medium ESX Agent Manager must be configured to limit access to internal packages.
V-256705 Medium ESX Agent Manager default servlet must be set to "readonly".
V-256704 Medium ESX Agent Manager must disable the shutdown port.
V-256701 Medium Rsyslog must be configured to monitor and ship ESX Agent Manager log files.
V-256700 Medium ESX Agent Manager must have the debug option disabled.
V-256703 Medium ESX Agent Manager must be configured with the appropriate ports.
V-256702 Medium ESX Agent Manager must set the secure flag for cookies.
V-256699 Medium ESX Agent Manager must not enable support for TRACE requests.
V-256698 Medium ESX Agent Manager must hide the server version.
V-256697 Medium ESX Agent Manager must be configured to not show error reports.
V-256696 Medium ESX Agent Manager must be configured to show error pages with minimal information.
V-256695 Medium ESX Agent Manager must not show directory listings.
V-256694 Medium ESX Agent Manager must set the welcome-file node to a default web page.
V-256693 Medium ESX Agent Manager must use the "setCharacterEncodingFilter" filter.
V-256692 Medium ESX Agent Manager must set URIEncoding to UTF-8.
V-256691 Medium ESX Agent Manager must limit the number of allowed connections.
V-256690 Medium ESX Agent Manager must fail to a known safe state if system initialization fails, shutdown fails, or aborts fail.
V-256673 Medium ESX Agent Manager must limit the amount of time that each Transmission Control Protocol (TCP) connection is kept alive.
V-256675 Medium ESX Agent Manager must limit the maximum size of a POST request.
V-256674 Medium ESX Agent Manager must limit the number of concurrent connections permitted.
V-256677 Medium ESX Agent Manager must record user access in a format that enables monitoring of remote access.
V-256676 Medium ESX Agent Manager must protect cookies from cross-site scripting (XSS).
V-256679 Medium ESX Agent Manager log files must only be modifiable by privileged users.
V-256678 Medium ESX Agent Manager must generate log records for system startup and shutdown.