UCF STIG Viewer Logo

VMware vSphere 7.0 vCenter Appliance RhttpProxy Security Technical Implementation Guide


Overview

Date Finding Count (8)
2023-02-21 CAT I (High): 0 CAT II (Med): 8 CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-256741 Medium The Envoy private key file must be protected from unauthorized access.
V-256740 Medium Envoy must use only Transport Layer Security (TLS) 1.2 for the protection of client connections.
V-256743 Medium Envoy (rhttpproxy) log files must be shipped via syslog to a central log server.
V-256742 Medium Envoy must exclusively use the HTTPS protocol for client connections.
V-256744 Medium Envoy log files must be shipped via syslog to a central log server.
V-256737 Medium Envoy must drop connections to disconnected clients.
V-256738 Medium Envoy must set a limit on established connections.
V-256739 Medium Envoy must be configured to operate in FIPS mode.