acceptedVMware vRealize Automation 7.x tc Server Security Technical Implementation GuideThis Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.DISASTIG.DOD.MILRelease: 1 Benchmark Date: 23 Jul 20213.2.2.360791.10.02I - Mission Critical Classified<ProfileDescription></ProfileDescription>I - Mission Critical Public<ProfileDescription></ProfileDescription>I - Mission Critical Sensitive<ProfileDescription></ProfileDescription>II - Mission Support Classified<ProfileDescription></ProfileDescription>II - Mission Support Public<ProfileDescription></ProfileDescription>II - Mission Support Sensitive<ProfileDescription></ProfileDescription>III - Administrative Classified<ProfileDescription></ProfileDescription>III - Administrative Public<ProfileDescription></ProfileDescription>III - Administrative Sensitive<ProfileDescription></ProfileDescription>SRG-APP-000001-WSR-000001<GroupDescription></GroupDescription>VRAU-TC-000005tc Server HORIZON must limit the number of maximum concurrent connections permitted.<VulnDiscussion>Resource exhaustion can occur when an unlimited number of concurrent requests are allowed on a web site, facilitating a denial-of-service attack. Unless the number of requests is controlled, the web server can consume enough system resources to cause a system crash.
Mitigating this kind of attack will include limiting the number of concurrent HTTP/HTTPS requests. Each incoming request requires a thread for the duration of that request. If more simultaneous requests are received than can be handled by the currently available request processing threads, additional threads will be created up to the value of the maxThreads attribute.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100991V-90341CCI-000054Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to and locate <Executor>.
Configure the <Executor> with the value 'maxThreads="300"'.
Note: The <Executor> node should be configured per the following:
<Executor maxThreads="300"
minSpareThreads="50"
name="tomcatThreadPool"
namePrefix="tomcat-http--"/>At the command prompt, execute the following command:
grep maxThreads /opt/vmware/horizon/workspace/conf/server.xml
If the value of "maxThreads" is not "300" or is missing, this is a finding.SRG-APP-000001-WSR-000001<GroupDescription></GroupDescription>VRAU-TC-000010tc Server VCO must limit the number of maximum concurrent connections permitted.<VulnDiscussion>Resource exhaustion can occur when an unlimited number of concurrent requests are allowed on a web site, facilitating a denial-of-service attack. Unless the number of requests is controlled, the web server can consume enough system resources to cause a system crash.
Mitigating this kind of attack will include limiting the number of concurrent HTTP/HTTPS requests. Each incoming request requires a thread for the duration of that request. If more simultaneous requests are received than can be handled by the currently available request processing threads, additional threads will be created up to the value of the maxThreads attribute.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100533V-89883CCI-000054Navigate to and open /etc/vco/app-server/server.xml.
Navigate to and locate the <Connector> node.
Configure the <Connector> with the value 'maxThreads="300"'.At the command prompt, execute the following command:
grep maxThreads /etc/vco/app-server/server.xml
If the value of "maxThreads" is not "300" or is missing, this is a finding.SRG-APP-000001-WSR-000001<GroupDescription></GroupDescription>VRAU-TC-000015tc Server VCAC must limit the number of maximum concurrent connections permitted.<VulnDiscussion>Resource exhaustion can occur when an unlimited number of concurrent requests are allowed on a web site, facilitating a denial-of-service attack. Unless the number of requests is controlled, the web server can consume enough system resources to cause a system crash.
Mitigating this kind of attack will include limiting the number of concurrent HTTP/HTTPS requests. Each incoming request requires a thread for the duration of that request. If more simultaneous requests are received than can be handled by the currently available request processing threads, additional threads will be created up to the value of the maxThreads attribute.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100535V-89885CCI-000054Navigate to and open /etc/vcac/server.xml.
Navigate to and locate <Executor>.
Configure the <Executor> with the value 'maxThreads="1000"'.
Note: The <Executor> node should be configured per the following:
<Executor
maxThreads="1000"
minSpareThreads="50"
name="tomcatThreadPool"
namePrefix="tomcat-http--"/>At the command prompt, execute the following command:
grep maxThreads /etc/vcac/server.xml
If the value of "maxThreads" is not "1000" or is missing, this is a finding.SRG-APP-000001-WSR-000001<GroupDescription></GroupDescription>VRAU-TC-000020tc Server HORIZON must limit the amount of time that each TCP connection is kept alive.<VulnDiscussion>Denial of Service is one threat against web servers. Many DoS attacks attempt to consume web server resources in such a way that no more resources are available to satisfy legitimate requests. Mitigation against these threats is to take steps to limit the number of resources that can be consumed in certain ways.
tc Server provides the connectionTimeout attribute. This sets the number of milliseconds tc Server will wait, after accepting a connection, for the request URI line to be presented. This timeout will also be used when reading the request body (if any).</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100537V-89887CCI-000054Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to each of the <Connector> nodes.
Configure each <Connector> node with the value 'connectionTimeout="20000"'.Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to each of the <Connector> nodes.
If the value of "connectionTimeout" is not set to "20000" or is missing, this is a finding.SRG-APP-000001-WSR-000001<GroupDescription></GroupDescription>VRAU-TC-000025tc Server VCO must limit the amount of time that each TCP connection is kept alive.<VulnDiscussion>Denial of Service is one threat against web servers. Many DoS attacks attempt to consume web server resources in such a way that no more resources are available to satisfy legitimate requests. Mitigation against these threats is to take steps to limit the number of resources that can be consumed in certain ways.
tc Server provides the connectionTimeout attribute. This sets the number of milliseconds tc Server will wait, after accepting a connection, for the request URI line to be presented. This timeout will also be used when reading the request body (if any).</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100539V-89889CCI-000054Navigate to and open /etc/vco/app-server/server.xml.
Navigate to the <Connector> node.
Configure the <Connector> node with the value 'connectionTimeout="10000"'.Navigate to and open /etc/vco/app-server/server.xml.
Navigate to the <Connector> node.
If the value of "connectionTimeout" is not set to "20000" or is missing, this is a finding.SRG-APP-000001-WSR-000001<GroupDescription></GroupDescription>VRAU-TC-000030tc Server VCAC must limit the amount of time that each TCP connection is kept alive.<VulnDiscussion>Denial of Service is one threat against web servers. Many DoS attacks attempt to consume web server resources in such a way that no more resources are available to satisfy legitimate requests. Mitigation against these threats is to take steps to limit the number of resources that can be consumed in certain ways.
tc Server provides the connectionTimeout attribute. This sets the number of milliseconds tc Server will wait, after accepting a connection, for the request URI line to be presented. This timeout will also be used when reading the request body (if any).</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100541V-89891CCI-000054Navigate to and open /etc/vcac/server.xml.
Navigate to the <Connector> node.
Configure the <Connector> node with the value 'connectionTimeout="10000"'.Navigate to and open /etc/vcac/server.xml.
Navigate to the <Connector> node.
If the value of "connectionTimeout" is not set to "10000" or is missing, this is a finding.SRG-APP-000001-WSR-000001<GroupDescription></GroupDescription>VRAU-TC-000035tc Server HORIZON must limit the number of times that each TCP connection is kept alive.<VulnDiscussion>KeepAlive provides long lived HTTP sessions that allow multiple requests to be sent over the same connection. Enabling KeepAlive mitigates the effects of several types of denial-of-service attacks.
An advantage of KeepAlive is the reduced latency in subsequent requests (no handshaking). However, a disadvantage is that server resources are not available to handle other requests while a connection is maintained between the server and the client.
tc Server can be configured to limit the number of subsequent requests that one client can submit to the server over an established connection. This limit helps provide a balance between the advantages of KeepAlive, while not allowing any one connection being held too long by any one client. maxKeepAliveRequests is the tc Server attribute that sets this limit.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100543V-89893CCI-000054Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to each of the <Connector> nodes.
Configure each <Connector> node with the value 'maxKeepAliveRequests="15"'.Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to each of the <Connector> nodes.
If the value of "maxKeepAliveRequests" is not set to "15" or is missing, this is a finding.SRG-APP-000001-WSR-000001<GroupDescription></GroupDescription>VRAU-TC-000040tc Server VCO must limit the number of times that each TCP connection is kept alive.<VulnDiscussion>KeepAlive provides long-lived HTTP sessions that allow multiple requests to be sent over the same connection. Enabling KeepAlive mitigates the effects of several types of denial-of-service attacks.
An advantage of KeepAlive is the reduced latency in subsequent requests (no handshaking). However, a disadvantage is that server resources are not available to handle other requests while a connection is maintained between the server and the client.
tc Server can be configured to limit the number of subsequent requests that one client can submit to the server over an established connection. This limit helps provide a balance between the advantages of KeepAlive, while not allowing any one connection being held too long by any one client. maxKeepAliveRequests is the tc Server attribute that sets this limit.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100545V-89895CCI-000054Navigate to and open /etc/vco/app-server/server.xml.
Navigate to the <Connector> node.
Configure the <Connector> node with the value 'maxKeepAliveRequests="15"'.Navigate to and open /etc/vco/app-server/server.xml.
Navigate to the <Connector> node.
If the value of "maxKeepAliveRequests" is not set to "15" or is missing, this is a finding.SRG-APP-000001-WSR-000001<GroupDescription></GroupDescription>VRAU-TC-000045tc Server VCAC must limit the number of times that each TCP connection is kept alive.<VulnDiscussion>KeepAlive provides long-lived HTTP sessions that allow multiple requests to be sent over the same connection. Enabling KeepAlive mitigates the effects of several types of denial-of-service attacks.
An advantage of KeepAlive is the reduced latency in subsequent requests (no handshaking). However, a disadvantage is that server resources are not available to handle other requests while a connection is maintained between the server and the client.
tc Server can be configured to limit the number of subsequent requests that one client can submit to the server over an established connection. This limit helps provide a balance between the advantages of KeepAlive, while not allowing any one connection being held too long by any one client. maxKeepAliveRequests is the tc Server attribute that sets this limit.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100547V-89897CCI-000054Navigate to and open /etc/vcac/server.xml.
Navigate to the <Connector> node.
Configure the <Connector> node with the value 'maxKeepAliveRequests="15"'.Navigate to and open /etc/vcac/server.xml.
Navigate to the <Connector> node.
If the value of "maxKeepAliveRequests" is not set to "15" or is missing, this is a finding.SRG-APP-000001-WSR-000002<GroupDescription></GroupDescription>VRAU-TC-000050tc Server HORIZON must perform server-side session management.<VulnDiscussion>Cookies are a common way to save session state over the HTTP(S) protocol. If an attacker can compromise session data stored in a cookie, they are better able to launch an attack against the server and its applications.
Session cookies stored on the server are more secure than cookies stored on the client. Therefore, tc Server must be configured correctly in order to generate and manage session cookies on the server. Managing cookies on the server provides a layer of defense to vRealize Automation.
By default, tc Server is designed to manage cookies on the server. However, incorrect configuration can turn off the default feature.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100549V-89899CCI-000054Navigate to and open /opt/vmware/horizon/workspace/conf/context.xml.
Navigate to and locate the <Context> node.
Remove the value 'cookies="false"' from the <Context> node.At the command prompt, execute the following command:
grep -E 'cookies=.false' /opt/vmware/horizon/workspace/conf/context.xml
If the command produces any output, this is a finding.SRG-APP-000001-WSR-000002<GroupDescription></GroupDescription>VRAU-TC-000055tc Server VCO must perform server-side session management.<VulnDiscussion>Cookies are a common way to save session state over the HTTP(S) protocol. If an attacker can compromise session data stored in a cookie, they are better able to launch an attack against the server and its applications.
Session cookies stored on the server are more secure than cookies stored on the client. Therefore, tc Server must be configured correctly in order to generate and manage session cookies on the server. Managing cookies on the server provides a layer of defense to vRealize Automation.
By default, tc Server is designed to manage cookies on the server. However, incorrect configuration can turn off the default feature.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100551V-89901CCI-000054Navigate to and open /etc/vco/app-server/context.xml.
Navigate to and locate the <Context> node.
Remove the value 'cookies="false"' from the <Context> node.At the command prompt, execute the following command:
grep -E 'cookies=.false' /etc/vco/app-server/context.xml
If the command produces any output, this is a finding.SRG-APP-000001-WSR-000002<GroupDescription></GroupDescription>VRAU-TC-000060tc Server VCAC must perform server-side session management.<VulnDiscussion>Cookies are a common way to save session state over the HTTP(S) protocol. If an attacker can compromise session data stored in a cookie, they are better able to launch an attack against the server and its applications.
Session cookies stored on the server are more secure than cookies stored on the client. Therefore, tc Server must be configured correctly in order to generate and manage session cookies on the server. Managing cookies on the server provides a layer of defense to vRealize Automation.
By default, tc Server is designed to manage cookies on the server. However, incorrect configuration can turn off the default feature.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100553V-89903CCI-000054Navigate to and open /etc/vcac/context.xml.
Navigate to and locate the <Context> node.
Remove the value 'cookies="false"' from the <Context> node.At the command prompt, execute the following command:
grep -E 'cookies=.false' /etc/vcac/context.xml
If the command produces any output, this is a finding.SRG-APP-000014-WSR-000006<GroupDescription></GroupDescription>VRAU-TC-000065tc Server HORIZON must be configured with FIPS 140-2 compliant ciphers for HTTPS connections.<VulnDiscussion>Encryption of data-in-flight is an essential element of protecting information confidentiality. If a web server uses weak or outdated encryption algorithms, then the server's communications can potentially be compromised.
The US Federal Information Processing Standards (FIPS) publication 140-2, Security Requirements for Cryptographic Modules (FIPS 140-2) identifies eleven areas for a cryptographic module used inside a security system that protects information. FIPS 140-2 approved ciphers provide the maximum level of encryption possible for a private web server.
Configuration of ciphers used by tc Server are set in the catalina.properties file. Only those ciphers specified in the configuration file, and which are available in the installed OpenSSL library, will be used by tc Server while encrypting data for transmission.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100555V-89905CCI-000068Navigate to and open /opt/vmware/horizon/workspace/conf/catalina.properties.
Navigate to and locate "bio-ssl.cipher.list".
Configure the "bio-ssl.cipher.list" with FIPS 140-2 compliant ciphers.At the command prompt, execute the following command:
grep bio-ssl.cipher.list /opt/vmware/horizon/workspace/conf/catalina.properties
If the value of "bio-ssl.cipher.list" does not match the list of FIPS 140-2 ciphers or is missing, this is a finding.
Note: To view a list of FIPS 140-2 ciphers, at the command prompt execute the following command:
openssl ciphers 'FIPS'SRG-APP-000014-WSR-000006<GroupDescription></GroupDescription>VRAU-TC-000070tc Server VCAC must be configured with FIPS 140-2 compliant ciphers for HTTPS connections.<VulnDiscussion>Encryption of data-in-flight is an essential element of protecting information confidentiality. If a web server uses weak or outdated encryption algorithms, then the server's communications can potentially be compromised.
The US Federal Information Processing Standards (FIPS) publication 140-2, Security Requirements for Cryptographic Modules (FIPS 140-2) identifies eleven areas for a cryptographic module used inside a security system that protects information. FIPS 140-2 approved ciphers provide the maximum level of encryption possible for a private web server.
Configuration of ciphers used by tc Server are set in the catalina.properties file. Only those ciphers specified in the configuration file, and which are available in the installed OpenSSL library, will be used by tc Server while encrypting data for transmission.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100557V-89907CCI-000068Navigate to and open /etc/vcac/catalina.properties.
Navigate to and locate "cipher".
Configure the "cipher" with FIPS 140-2 compliant ciphers.At the command prompt, execute the following command:
grep cipher /etc/vcac/catalina.properties
If the value of "cipher" does not match the list of FIPS 140-2 ciphers or is missing, this is a finding.
Note: To view a list of FIPS 140-2 ciphers, at the command prompt execute the following command:
openssl ciphers 'FIPS'SRG-APP-000015-WSR-000014<GroupDescription></GroupDescription>VRAU-TC-000075tc Server HORIZON must use cryptography to protect the integrity of remote sessions.<VulnDiscussion>Data exchanged between the user and the web server can range from static display data to credentials used to log into the hosted application. Even when data appears to be static, the non-displayed logic in a web page may expose business logic or trusted system relationships. The integrity of all the data being exchanged between the user and web server must always be trusted. To protect the integrity and trust, encryption methods should be used to protect the complete communication session.
HTTP connections in tc Server are managed through the Connector object. Setting the Connector's SSLEnabled flag, SSL handshake/encryption/decryption is enabled.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100559V-89909CCI-001453Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to each of the <Connector> nodes.
Configure each <Connector> node with the value 'SSLEnabled="true"'.Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to each of the <Connector> nodes.
If the value of "SSLEnabled" is not set to "true" or is missing, this is a finding.SRG-APP-000015-WSR-000014<GroupDescription></GroupDescription>VRAU-TC-000080tc Server VCAC must use cryptography to protect the integrity of remote sessions.<VulnDiscussion>Data exchanged between the user and the web server can range from static display data to credentials used to log into the hosted application. Even when data appears to be static, the non-displayed logic in a web page may expose business logic or trusted system relationships. The integrity of all the data being exchanged between the user and web server must always be trusted. To protect the integrity and trust, encryption methods should be used to protect the complete communication session.
HTTP connections in tc Server are managed through the Connector object. Setting the Connector's SSLEnabled flag, SSL handshake/encryption/decryption is enabled.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100993V-90343CCI-001453Navigate to and open /etc/vcac/server.xml.
Navigate to the <Connector> node.
Configure the <Connector> node with the value 'SSLEnabled="true"'.Navigate to and open /etc/vcac/server.xml.
Navigate to the <Connector> node.
If the value of "SSLEnabled" is not set to "true" or is missing, this is a finding.SRG-APP-000016-WSR-000005<GroupDescription></GroupDescription>VRAU-TC-000085tc Server HORIZON must record user access in a format that enables monitoring of remote access.<VulnDiscussion>Remote access can be exploited by an attacker to compromise the server. By recording all remote access activities, it will be possible to determine the attacker's location, intent, and degree of success.
As a Tomcat derivative, tc Server can be configured with an AccessLogValve. A Valve element represents a component that can be inserted into the request processing pipeline. The Access Log Valve creates log files in the same format as those created by standard web servers.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100561V-89911CCI-000067Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to and locate <Host>.
Configure the <Host> node with the <AccessLogValve> below.
Note: The AccessLogValve should be configured as follows:
<Valve className="org.apache.catalina.valves.AccessLogValve"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="localhost_access_log."
suffix=".txt"/>Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to the <Host> node.
Verify that the node contains a <Valve className="org.apache.catalina.valves.AccessLogValve"> node.
If an "AccessLogValve" is not configured correctly or is missing, this is a finding.
Note: The AccessLogValve should be configured as follows:
<Valve className="org.apache.catalina.valves.AccessLogValve"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="access_log"
suffix=".txt"
rotatable="false"
requestAttributesEnabled="true"
checkExists="true"/>SRG-APP-000016-WSR-000005<GroupDescription></GroupDescription>VRAU-TC-000090tc Server VCO must record user access in a format that enables monitoring of remote access.<VulnDiscussion>Remote access can be exploited by an attacker to compromise the server. By recording all remote access activities, it will be possible to determine the attacker's location, intent, and degree of success.
As a Tomcat derivative, tc Server can be configured with an AccessLogValve. A Valve element represents a component that can be inserted into the request processing pipeline. The Access Log Valve creates log files in the same format as those created by standard web servers.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100563V-89913CCI-000067Navigate to and open /etc/vco/app-server/server.xml.
Navigate to and locate <Host>.
Configure the <Host> node with the <AccessLogValve> below.
Note: The AccessLogValve should be configured as follows:
<Valve className="org.apache.catalina.valves.AccessLogValve"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="localhost_access_log."
suffix=".txt"/>Navigate to and open /etc/vco/app-server/server.xml.
Navigate to the <Host> node.
Verify that the node contains a <Valve className="org.apache.catalina.valves.AccessLogValve"> node.
If an "AccessLogValve" is not configured correctly or is missing, this is a finding.
Note: The AccessLogValve should be configured as follows:
<Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs"
prefix="localhost_access_log" suffix=".txt"
pattern="%h %l %u %t "%r" %s %b"
rotatable="false"
checkExists="true"/>SRG-APP-000016-WSR-000005<GroupDescription></GroupDescription>VRAU-TC-000095tc Server VCAC must record user access in a format that enables monitoring of remote access.<VulnDiscussion>Remote access can be exploited by an attacker to compromise the server. By recording all remote access activities, it will be possible to determine the attacker's location, intent, and degree of success.
As a Tomcat derivative, tc Server can be configured with an AccessLogValve. A Valve element represents a component that can be inserted into the request processing pipeline. The Access Log Valve creates log files in the same format as those created by standard web servers.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100565V-89915CCI-000067Navigate to and open /etc/vcac/server.xml.
Navigate to and locate <Host>.
Configure the <Host> node with the <AccessLogValve> below.
Note: The AccessLogValve should be configured as follows:
<Valve className="org.apache.catalina.valves.AccessLogValve"
checkExists="true"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="access_log"
requestAttributesEnabled="true"
rotatable="false"
suffix=".txt"/>Navigate to and open /etc/vcac/server.xml.
Navigate to the <Host> node.
Verify that the node contains a <Valve className="org.apache.catalina.valves.AccessLogValve"> node.
If an "AccessLogValve" is not configured correctly or is missing, this is a finding.
Note: The AccessLogValve should be configured as follows:
<Valve className="org.apache.catalina.valves.AccessLogValve"
checkExists="true"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="access_log"
requestAttributesEnabled="true"
rotatable="false"
suffix=".txt"/>SRG-APP-000089-WSR-000047<GroupDescription></GroupDescription>VRAU-TC-000105tc Server ALL must generate log records for system startup and shutdown.<VulnDiscussion>Logging must be started as soon as possible when a service starts and when a service is stopped. Many forms of suspicious actions can be detected by analyzing logs for unexpected service starts and stops. Also, by starting to log immediately after a service starts, it becomes more difficult for suspicious activity to go unlogged.
During start, tc Server reports system messages onto STDOUT and STDERR. These messages will be logged if the initialization script is configured correctly. For historical reasons, the standard log file for this is called catalina.out.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100567V-89917CCI-000169Navigate to and open /usr/share/tomcat/bin/catalina.sh.
Navigate to and locate the start block : "elif [ "$1" = "start" ] ; then"
Navigate to and locate both "eval" statements : "org.apache.catalina.startup.Bootstrap "$@" start \"
Add this statement immediately below both of the "eval" statements : '>> "$CATALINA_OUT" 2>&1 "&"'At the command prompt, execute the following command:
more /storage/log/vmware/vco/app-server/catalina.out
Verify that tc Server start and stop events are being logged.
If the tc Server start and stop events are not being recorded, this is a finding.
Note: The tc Server service is referred to as Catalina in the log.SRG-APP-000089-WSR-000047<GroupDescription></GroupDescription>VRAU-TC-000110tc Server HORIZON must generate log records for user access and authentication events.<VulnDiscussion>Log records can be generated from various components within the web server (e.g., httpd, plug-ins to external backends, etc.). From a web server perspective, certain specific web server functionalities may be logged as well. The web server must allow the definition of what events are to be logged. As conditions change, the number and types of events to be logged may change, and the web server must be able to facilitate these changes.
As a Tomcat derivative, tc Server can be configured with an AccessLogValve. A Valve element represents a component that can be inserted into the request processing pipeline. The pattern attribute of the AccessLogValve controls which data gets logged.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100569V-89919CCI-000169Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to and locate <Host>.
Configure the <Host> node with the <AccessLogValve> below.
Note: The "AccessLogValve" should be configured as follows:
<Valve className="org.apache.catalina.valves.AccessLogValve"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="localhost_access_log."
suffix=".txt"/>Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to the <Host> node.
Verify that the node contains a <Valve className="org.apache.catalina.valves.AccessLogValve"> node.
If an "AccessLogValve" is not configured correctly or is missing, this is a finding.
Note: The "AccessLogValve" should be configured as follows:
<Valve className="org.apache.catalina.valves.AccessLogValve"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="access_log"
suffix=".txt"
rotatable="false"
requestAttributesEnabled="true"
checkExists="true"/>SRG-APP-000089-WSR-000047<GroupDescription></GroupDescription>VRAU-TC-000115tc Server VCO must generate log records for user access and authentication events.<VulnDiscussion>Log records can be generated from various components within the web server (e.g., httpd, plug-ins to external backends, etc.). From a web server perspective, certain specific web server functionalities may be logged as well. The web server must allow the definition of what events are to be logged. As conditions change, the number and types of events to be logged may change, and the web server must be able to facilitate these changes.
As a Tomcat derivative, tc Server can be configured with an AccessLogValve. A Valve element represents a component that can be inserted into the request processing pipeline. The pattern attribute of the AccessLogValve controls which data gets logged.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100571V-89921CCI-000169Navigate to and open /etc/vco/app-server/server.xml.
Navigate to and locate <Host>.
Configure the <Host> node with the <AccessLogValve> below.
Note: The "AccessLogValve" should be configured as follows:
<Valve className="org.apache.catalina.valves.AccessLogValve"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="localhost_access_log."
suffix=".txt"/>Navigate to and open /etc/vco/app-server/server.xml.
Navigate to the <Host> node.
Verify that the node contains a <Valve className="org.apache.catalina.valves.AccessLogValve"> node.
If an "AccessLogValve" is not configured correctly or is missing, this is a finding.
Note: The AccessLogValve should be configured as follows:
<Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs"
prefix="localhost_access_log" suffix=".txt"
pattern="%h %l %u %t "%r" %s %b"
rotatable="false"
checkExists="true"/>SRG-APP-000089-WSR-000047<GroupDescription></GroupDescription>VRAU-TC-000120tc Server VCAC must generate log records for user access and authentication events.<VulnDiscussion>Log records can be generated from various components within the web server (e.g., httpd, plug-ins to external backends, etc.). From a web server perspective, certain specific web server functionalities may be logged as well. The web server must allow the definition of what events are to be logged. As conditions change, the number and types of events to be logged may change, and the web server must be able to facilitate these changes.
As a Tomcat derivative, tc Server can be configured with an AccessLogValve. A Valve element represents a component that can be inserted into the request processing pipeline. The pattern attribute of the AccessLogValve controls which data gets logged.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100573V-89923CCI-000169Navigate to and open /etc/vcac/server.xml.
Navigate to and locate <Host>.
Configure the <Host> node with the <AccessLogValve> below.
Note: The "AccessLogValve" should be configured as follows:
<Valve className="org.apache.catalina.valves.AccessLogValve"
checkExists="true"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="access_log"
requestAttributesEnabled="true"
rotatable="false"
suffix=".txt"/>Navigate to and open /etc/vcac/server.xml.
Navigate to the <Host> node.
Verify that the node contains a <Valve className="org.apache.catalina.valves.AccessLogValve"> node.
If an "AccessLogValve" is not configured correctly or is missing, this is a finding.
Note: The "AccessLogValve" should be configured as follows:
<Valve className="org.apache.catalina.valves.AccessLogValve"
checkExists="true"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="access_log"
requestAttributesEnabled="true"
rotatable="false"
suffix=".txt"/>SRG-APP-000092-WSR-000055<GroupDescription></GroupDescription>VRAU-TC-000125tc Server ALL must initiate logging during service start-up.<VulnDiscussion>An attacker can compromise a web server during the startup process. If logging is not initiated until all the web server processes are started, key information may be missed and not available during a forensic investigation. To assure all logable events are captured, the web server must begin logging once the first web server process is initiated.
During start, tc Server reports system messages onto STDOUT and STDERR. These messages will be logged if the initialization script is configured correctly. For historical reasons, the standard log file for this is called catalina.out.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100575V-89925CCI-001464Navigate to and open Navigate to and open /usr/share/tomcat/bin/catalina.sh.
Navigate to and locate the start block : "elif [ "$1" = "start" ] ; then"
Navigate to and locate both "eval" statements : "org.apache.catalina.startup.Bootstrap "$@" start \"
Add this statement immediately below both of the "eval" statements : '>> "$CATALINA_OUT" 2>&1 "&"'At the command prompt, execute the following command:
more /usr/share/tomcat/bin/catalina.sh
Type /touch "$CATALINA_OUT"
Verify that the start command contains the command ">> "$CATALINA_OUT" 2>&1 "&""
If the command is not correct or is missing, this is a finding.
Note: Use the "Enter" key to scroll down after typing /touch "$CATALINA_OUT"SRG-APP-000095-WSR-000056<GroupDescription></GroupDescription>VRAU-TC-000145tc Server HORIZON must produce log records containing sufficient information to establish what type of events occurred.<VulnDiscussion>After a security incident has occurred, investigators will often review log files to determine what happened. Understanding what type of event occurred is critical for investigation of a suspicious event.
Like all servers, tc Server will typically process GET and POST requests clients. These will help investigators understand what happened.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100583V-89933CCI-000130Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to and locate <Host>.
Configure the <Host> node with the <AccessLogValve> below.
Note: The "AccessLogValve" should be configured as follows:
<Valve className="org.apache.catalina.valves.AccessLogValve"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="localhost_access_log."
suffix=".txt"/>At the command prompt, execute the following command:
tail /storage/log/vmware/horizon/localhost_access_log.YYYY-MM-dd.txt
Note: Substitute the actual date in the file name.
If HTTP "GET" and/or "POST" events are not being recorded, this is a finding.SRG-APP-000095-WSR-000056<GroupDescription></GroupDescription>VRAU-TC-000150tc Server VCO must produce log records containing sufficient information to establish what type of events occurred.<VulnDiscussion>After a security incident has occurred, investigators will often review log files to determine what happened. Understanding what type of event occurred is critical for investigation of a suspicious event.
Like all servers, tc Server will typically process GET and POST requests clients. These will help investigators understand what happened.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100585V-89935CCI-000130Navigate to and open /etc/vco/app-server/server.xml.
Navigate to and locate <Host>.
Configure the <Host> node with the <AccessLogValve> below.
Note: The "AccessLogValve" should be configured as follows:
<Valve className="org.apache.catalina.valves.AccessLogValve"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="localhost_access_log."
suffix=".txt"/>At the command prompt, execute the following command:
tail /storage/log/vmware/vco/app-server/localhost_access_log.txt
If HTTP "GET" and/or "POST" events are not being recorded, this is a finding.SRG-APP-000095-WSR-000056<GroupDescription></GroupDescription>VRAU-TC-000155tc Server VCAC must produce log records containing sufficient information to establish what type of events occurred.<VulnDiscussion>After a security incident has occurred, investigators will often review log files to determine what happened. Understanding what type of event occurred is critical for investigation of a suspicious event.
Like all servers, tc Server will typically process GET and POST requests clients. These will help investigators understand what happened.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100587V-89937CCI-000130Navigate to and open /etc/vcac/server.xml.
Navigate to and locate <Host>.
Configure the <Host> node with the <AccessLogValve> below.
Note: The "AccessLogValve" should be configured as follows:
<Valve className="org.apache.catalina.valves.AccessLogValve"
checkExists="true"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="access_log"
requestAttributesEnabled="true"
rotatable="false"
suffix=".txt"/>At the command prompt, execute the following command:
tail /storage/log/vmware/vcac/access_log.YYYY-MM-dd.txt
Note: Substitute the actual date in the file name.
If HTTP "GET" and/or "POST" events are not being recorded, this is a finding.SRG-APP-000096-WSR-000057<GroupDescription></GroupDescription>VRAU-TC-000160tc Server HORIZON must produce log records containing sufficient information to establish when (date and time) events occurred.<VulnDiscussion>After a security incident has occurred, investigators will often review log files to determine when events occurred. Understanding the precise sequence of events is critical for investigation of a suspicious event.
As a Tomcat derivative, tc Server can be configured with an AccessLogValve. A Valve element represents a component that can be inserted into the request processing pipeline. The pattern attribute of the AccessLogValve controls which data gets logged. The %t parameter specifies that the system time should be recorded.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100589V-89939CCI-000131Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to and locate <Host>.
Configure the <Host> node with the <AccessLogValve> below.
Note: The "AccessLogValve" should be configured as follows:
<Valve className="org.apache.catalina.valves.AccessLogValve"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="localhost_access_log."
suffix=".txt"/>At the command prompt, execute the following command:
tail /storage/log/vmware/horizon/localhost_access_log.YYYY-MM-dd.txt
Note: Substitute the actual date in the file name.
If the time and date of events are not being recorded, this is a finding.SRG-APP-000096-WSR-000057<GroupDescription></GroupDescription>VRAU-TC-000165tc Server VCO must produce log records containing sufficient information to establish when (date and time) events occurred.<VulnDiscussion>After a security incident has occurred, investigators will often review log files to determine when events occurred. Understanding the precise sequence of events is critical for investigation of a suspicious event.
As a Tomcat derivative, tc Server can be configured with an AccessLogValve. A Valve element represents a component that can be inserted into the request processing pipeline. The pattern attribute of the AccessLogValve controls which data gets logged. The %t parameter specifies that the system time should be recorded.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100591V-89941CCI-000131Navigate to and open /etc/vco/app-server/server.xml.
Navigate to and locate <Host>.
Configure the <Host> node with the <AccessLogValve> below.
Note: The "AccessLogValve" should be configured as follows:
<Valve className="org.apache.catalina.valves.AccessLogValve"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="localhost_access_log."
suffix=".txt"/>At the command prompt, execute the following command:
tail /storage/log/vmware/vco/app-server/localhost_access_log.txt
If the time and date of events are not being recorded, this is a finding.SRG-APP-000096-WSR-000057<GroupDescription></GroupDescription>VRAU-TC-000170tc Server VCAC must produce log records containing sufficient information to establish when (date and time) events occurred.<VulnDiscussion>After a security incident has occurred, investigators will often review log files to determine when events occurred. Understanding the precise sequence of events is critical for investigation of a suspicious event.
As a Tomcat derivative, tc Server can be configured with an AccessLogValve. A Valve element represents a component that can be inserted into the request processing pipeline. The pattern attribute of the AccessLogValve controls which data gets logged. The %t parameter specifies that the system time should be recorded.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100593V-89943CCI-000131Navigate to and open /etc/vcac/server.xml.
Navigate to and locate <Host>.
Configure the <Host> node with the <AccessLogValve> below.
Note: The "AccessLogValve" should be configured as follows:
<Valve className="org.apache.catalina.valves.AccessLogValve"
checkExists="true"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="access_log"
requestAttributesEnabled="true"
rotatable="false"
suffix=".txt"/>At the command prompt, execute the following command:
tail /storage/log/vmware/vcac/access_log.YYYY-MM-dd.txt
Note: Substitute the actual date in the file name.
If the time and date of events are not being recorded, this is a finding.SRG-APP-000097-WSR-000058<GroupDescription></GroupDescription>VRAU-TC-000175tc Server HORIZON must produce log records containing sufficient information to establish where within the web server the events occurred.<VulnDiscussion>After a security incident has occurred, investigators will often review log files to determine what happened. tc Server HORIZON must create a log entry when users access the system, and the system authenticates the users.
The logs must contain information about user sessions to include what type of event occurred, when (date and time) events occurred, where within the server the events occurred, the client source of the events, the outcome (success or failure) of the event, the identity of the user/subject/process associated with the event.
Like all web servers, tc Server will log the requested URL and the parameters, if any, sent in the request. This information will enable investigators to determine where in the server an action was requested.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100595V-89945CCI-000132Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to and locate <Host>.
Configure the <Host> node with the <AccessLogValve> below.
Note: The "AccessLogValve" should be configured as follows:
<Valve className="org.apache.catalina.valves.AccessLogValve"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="localhost_access_log."
suffix=".txt"/>At the command prompt, execute the following command:
tail /storage/log/vmware/horizon/localhost_access_log.YYYY-MM-dd.txt
Note: Substitute the actual date in the file name.
If the location of events are not being recorded, this is a finding.SRG-APP-000097-WSR-000058<GroupDescription></GroupDescription>VRAU-TC-000180tc Server VCO must produce log records containing sufficient information to establish where within the web server the events occurred.<VulnDiscussion>After a security incident has occurred, investigators will often review log files to determine what happened. tc Server HORIZON must create a log entry when users access the system, and the system authenticates the users.
The logs must contain information about user sessions to include what type of event occurred, when (date and time) events occurred, where within the server the events occurred, the client source of the events, the outcome (success or failure) of the event, the identity of the user/subject/process associated with the event.
Like all web servers, tc Server will log the requested URL and the parameters, if any, sent in the request. This information will enable investigators to determine where in the server an action was requested.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100597V-89947CCI-000132Navigate to and open /etc/vco/app-server/server.xml.
Navigate to and locate <Host>.
Configure the <Host> node with the <AccessLogValve> below.
Note: The "AccessLogValve" should be configured as follows:
<Valve className="org.apache.catalina.valves.AccessLogValve"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="localhost_access_log."
suffix=".txt"/>At the command prompt, execute the following command:
tail /storage/log/vmware/vco/app-server/localhost_access_log.txt
If the location of events are not being recorded, this is a finding.SRG-APP-000097-WSR-000058<GroupDescription></GroupDescription>VRAU-TC-000185tc Server VCAC must produce log records containing sufficient information to establish where within the web server the events occurred.<VulnDiscussion>After a security incident has occurred, investigators will often review log files to determine what happened. tc Server HORIZON must create a log entry when users access the system, and the system authenticates the users.
The logs must contain information about user sessions to include what type of event occurred, when (date and time) events occurred, where within the server the events occurred, the client source of the events, the outcome (success or failure) of the event, the identity of the user/subject/process associated with the event.
Like all web servers, tc Server will log the requested URL and the parameters, if any, sent in the request. This information will enable investigators to determine where in the server an action was requested.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100599V-89949CCI-000132Navigate to and open /etc/vcac/server.xml.
Navigate to and locate <Host>.
Configure the <Host> node with the <AccessLogValve> below.
Note: The "AccessLogValve" should be configured as follows:
<Valve className="org.apache.catalina.valves.AccessLogValve"
checkExists="true"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="access_log"
requestAttributesEnabled="true"
rotatable="false"
suffix=".txt"/>At the command prompt, execute the following command:
tail /storage/log/vmware/vcac/access_log.YYYY-MM-dd.txt
Note: Substitute the actual date in the file name.
If the location of events are not being recorded, this is a finding.SRG-APP-000098-WSR-000059<GroupDescription></GroupDescription>VRAU-TC-000190tc Server HORIZON must produce log records containing sufficient information to establish the source of events.<VulnDiscussion>After a security incident has occurred, investigators will often review log files to determine what happened. tc Server HORIZON must create a log entry when users access the system, and the system authenticates the users.
The logs must contain information about user sessions to include what type of event occurred, when (date and time) events occurred, where within the server the events occurred, the client source of the events, the outcome (success or failure) of the event, the identity of the user/subject/process associated with the event.
As a Tomcat derivative, tc Server can be configured with an AccessLogValve. A Valve element represents a component that can be inserted into the request processing pipeline. The pattern attribute of the AccessLogValve controls which data gets logged. The %h parameter will record the remote hostname or IP address that sent the request; i.e. the source of the event.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100601V-89951CCI-000133Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to and locate <Host>.
Configure the <Host> node with the <AccessLogValve> below.
Note: The "AccessLogValve" should be configured as follows:
<Valve className="org.apache.catalina.valves.AccessLogValve"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="localhost_access_log."
suffix=".txt"/>At the command prompt, execute the following command:
tail /storage/log/vmware/horizon/localhost_access_log.YYYY-MM-dd.txt
Note: Substitute the actual date in the file name.
If the source IP of events are not being recorded, this is a finding.SRG-APP-000098-WSR-000059<GroupDescription></GroupDescription>VRAU-TC-000195tc Server VCO must produce log records containing sufficient information to establish the source of events.<VulnDiscussion>After a security incident has occurred, investigators will often review log files to determine what happened. tc Server HORIZON must create a log entry when users access the system, and the system authenticates the users.
The logs must contain information about user sessions to include what type of event occurred, when (date and time) events occurred, where within the server the events occurred, the client source of the events, the outcome (success or failure) of the event, the identity of the user/subject/process associated with the event.
As a Tomcat derivative, tc Server can be configured with an AccessLogValve. A Valve element represents a component that can be inserted into the request processing pipeline. The pattern attribute of the AccessLogValve controls which data gets logged. The %h parameter will record the remote hostname or IP address that sent the request; i.e. the source of the event.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100603V-89953CCI-000133Navigate to and open /etc/vco/app-server/server.xml.
Navigate to and locate <Host>.
Configure the <Host> node with the <AccessLogValve> below.
Note: The "AccessLogValve" should be configured as follows:
<Valve className="org.apache.catalina.valves.AccessLogValve"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="localhost_access_log."
suffix=".txt"/>At the command prompt, execute the following command:
tail /storage/log/vmware/vco/app-server/localhost_access_log.txt
If the source IP of events are not being recorded, this is a finding.SRG-APP-000098-WSR-000059<GroupDescription></GroupDescription>VRAU-TC-000200tc Server VCAC must produce log records containing sufficient information to establish the source of events.<VulnDiscussion>After a security incident has occurred, investigators will often review log files to determine what happened. tc Server HORIZON must create a log entry when users access the system, and the system authenticates the users.
The logs must contain information about user sessions to include what type of event occurred, when (date and time) events occurred, where within the server the events occurred, the client source of the events, the outcome (success or failure) of the event, the identity of the user/subject/process associated with the event.
As a Tomcat derivative, tc Server can be configured with an AccessLogValve. A Valve element represents a component that can be inserted into the request processing pipeline. The pattern attribute of the AccessLogValve controls which data gets logged. The %h parameter will record the remote hostname or IP address that sent the request; i.e. the source of the event.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100605V-89955CCI-000133Navigate to and open /etc/vcac/server.xml.
Navigate to and locate <Host>.
Configure the <Host> node with the <AccessLogValve> below.
Note: The "AccessLogValve" should be configured as follows:
<Valve className="org.apache.catalina.valves.AccessLogValve"
checkExists="true"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="access_log"
requestAttributesEnabled="true"
rotatable="false"
suffix=".txt"/>At the command prompt, execute the following command:
tail /storage/log/vmware/vcac/access_log.YYYY-MM-dd.txt
Note: Substitute the actual date in the file name.
If the source IP of events are not being recorded, this is a finding.SRG-APP-000098-WSR-000060<GroupDescription></GroupDescription>VRAU-TC-000205tc Server HORIZON must be configured with the RemoteIpValve in order to produce log records containing the client IP information as the source and destination and not the load balancer or proxy IP information with each event.<VulnDiscussion>tc Server HORIZON logging capability is critical for accurate forensic analysis. Without sufficient and accurate information, a correct replay of the events cannot be determined.
Ascertaining the correct source, e.g. source IP, of the events is important during forensic analysis. Correctly determining the source of events will add information to the overall reconstruction of the logable event. By determining the source of the event correctly, analysis of the enterprise can be undertaken to determine if events tied to the source occurred in other areas within the enterprise.
tc Server HORIZON must be configured with the RemoteIpValve element in order to record the Client source vice the load balancer or proxy server as the source of every logable event. The RemoteIpValve enables the x-forward-* HTTP properties, which are used by the load balance to provide the client source.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100607V-89957CCI-000133Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to and locate <Host>.
Configure the <Host> node with the <RemoteIpValve> below.
Note: The "RemoteIpValve" should be configured as follows:
<Valve className="org.apache.catalina.valves.RemoteIpValve"
httpServerPort="80"
httpsServerPort="443"
protocolHeader="x-forwarded-proto"
proxiesHeader="x-forwarded-by"
remoteIpHeader="x-forwarded-for"
internalProxies="127\.0\.0\.1"/>At the command prompt, execute the following command:
tail /storage/log/vmware/horizon/localhost_access_log.YYYY-MM-dd.txt
Note: Substitute the actual date in the file name.
If actual client IP information, not load balancer or proxy server, is not being recorded, this is a finding.SRG-APP-000098-WSR-000060<GroupDescription></GroupDescription>VRAU-TC-000210tc Server VCO must be configured with the RemoteIpValve in order to produce log records containing the client IP information as the source and destination and not the load balancer or proxy IP information with each event.<VulnDiscussion>tc Server HORIZON logging capability is critical for accurate forensic analysis. Without sufficient and accurate information, a correct replay of the events cannot be determined.
Ascertaining the correct source, e.g. source IP, of the events is important during forensic analysis. Correctly determining the source of events will add information to the overall reconstruction of the logable event. By determining the source of the event correctly, analysis of the enterprise can be undertaken to determine if events tied to the source occurred in other areas within the enterprise.
tc Server HORIZON must be configured with the RemoteIpValve element in order to record the Client source vice the load balancer or proxy server as the source of every logable event. The RemoteIpValve enables the x-forward-* HTTP properties, which are used by the load balance to provide the client source.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100609V-89959CCI-000133Navigate to and open /etc/vco/app-server/server.xml.
Navigate to and locate <Host>.
Configure the <Host> node with the <RemoteIpValve> below.
Note: The "RemoteIpValve" should be configured as follows:
<Valve className="org.apache.catalina.valves.RemoteIpValve"
remoteIpHeader="x-forwarded-for"
remoteIpProxiesHeader="x-forwarded-by"
internalProxies=".*"
protocolHeader="x-forwarded-proto" />At the command prompt, execute the following command:
tail /storage/log/vmware/vco/app-server/localhost_access_log.txt
If actual client IP information, not load balancer or proxy server, is not being recorded, this is a finding.SRG-APP-000098-WSR-000060<GroupDescription></GroupDescription>VRAU-TC-000215tc Server VCAC must be configured with the RemoteIpValve in order to produce log records containing the client IP information as the source and destination and not the load balancer or proxy IP information with each event.<VulnDiscussion>tc Server VCAC logging capability is critical for accurate forensic analysis. Without sufficient and accurate information, a correct replay of the events cannot be determined.
Ascertaining the correct source, e.g. source IP, of the events is important during forensic analysis. Correctly determining the source of events will add information to the overall reconstruction of the logable event. By determining the source of the event correctly, analysis of the enterprise can be undertaken to determine if events tied to the source occurred in other areas within the enterprise.
tc Server VCAC must be configured with the RemoteIpValve element in order to record the Client source vice the load balancer or proxy server as the source of every logable event. The RemoteIpValve enables the x-forward-* HTTP properties, which are used by the load balance to provide the client source.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100611V-89961CCI-000133Navigate to and open /etc/vcac/server.xml.
Navigate to and locate <Host>.
Configure the <Host> node with the <RemoteIpValve> below.
Note: The "RemoteIpValve" should be configured as follows:
<Valve className="org.apache.catalina.valves.RemoteIpValve"
httpServerPort="80"
httpsServerPort="443"
internalProxies="127\.0\.0\.1"
protocolHeader="x-forwarded-proto"
proxiesHeader="x-forwarded-by"
remoteIpHeader="x-forwarded-for"/>At the command prompt, execute the following command:
tail /storage/log/vmware/vcac/access_log.YYYY-MM-dd.txt
Note: Substitute the actual date in the file name.
If actual client IP information, not load balancer or proxy server, is not being recorded, this is a finding.SRG-APP-000099-WSR-000061<GroupDescription></GroupDescription>VRAU-TC-000220tc Server HORIZON must produce log records that contain sufficient information to establish the outcome (success or failure) of events.<VulnDiscussion>After a security incident has occurred, investigators will often review log files to determine what happened. tc Server HORIZON must create a log entry when users access the system, and the system authenticates the users.
The logs must contain information about user sessions to include what type of event occurred, when (date and time) events occurred, where within the server the events occurred, the client source of the events, the outcome (success or failure) of the event, the identity of the user/subject/process associated with the event.
Like all web servers, tc Server generates HTTP status codes. The status code is a 3-digit indicator of the outcome of the server's response to the request.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100613V-89963CCI-000134Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to and locate <Host>.
Configure the <Host> node with the <AccessLogValve> below.
Note: The "AccessLogValve" should be configured as follows:
<Valve className="org.apache.catalina.valves.AccessLogValve"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="localhost_access_log."
suffix=".txt"/>At the command prompt, execute the following command:
tail /storage/log/vmware/horizon/localhost_access_log.YYYY-MM-dd.txt
Note: Substitute the actual date in the file name.
If the HTTP status codes are not being recorded, this is a finding.
Note: HTTP status codes are 3-digit codes, which are recorded immediately after "HTTP/1.1"SRG-APP-000099-WSR-000061<GroupDescription></GroupDescription>VRAU-TC-000225tc Server VCO must produce log records that contain sufficient information to establish the outcome (success or failure) of events.<VulnDiscussion>After a security incident has occurred, investigators will often review log files to determine what happened. tc Server HORIZON must create a log entry when users access the system, and the system authenticates the users.
The logs must contain information about user sessions to include what type of event occurred, when (date and time) events occurred, where within the server the events occurred, the client source of the events, the outcome (success or failure) of the event, the identity of the user/subject/process associated with the event.
Like all web servers, tc Server generates HTTP status codes. The status code is a 3-digit indicator of the outcome of the server's response to the request.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100615V-89965CCI-000134Navigate to and open /etc/vco/app-server/server.xml.
Navigate to and locate <Host>.
Configure the <Host> node with the <AccessLogValve> below.
Note: The "AccessLogValve" should be configured as follows:
<Valve className="org.apache.catalina.valves.AccessLogValve"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="localhost_access_log."
suffix=".txt"/>At the command prompt, execute the following command:
tail /storage/log/vmware/vco/app-server/localhost_access_log.txt
If the HTTP status codes are not being recorded, this is a finding.
Note: HTTP status codes are 3-digit codes, which are recorded immediately after "HTTP/1.1"SRG-APP-000099-WSR-000061<GroupDescription></GroupDescription>VRAU-TC-000230tc Server VCAC must produce log records that contain sufficient information to establish the outcome (success or failure) of events.<VulnDiscussion>After a security incident has occurred, investigators will often review log files to determine what happened. tc Server HORIZON must create a log entry when users access the system, and the system authenticates the users.
The logs must contain information about user sessions to include what type of event occurred, when (date and time) events occurred, where within the server the events occurred, the client source of the events, the outcome (success or failure) of the event, the identity of the user/subject/process associated with the event.
Like all web servers, tc Server generates HTTP status codes. The status code is a 3-digit indicator of the outcome of the server's response to the request.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100617V-89967CCI-000134Navigate to and open /etc/vcac/server.xml.
Navigate to and locate <Host>.
Configure the <Host> node with the <AccessLogValve> below.
Note: The "AccessLogValve" should be configured as follows:
<Valve className="org.apache.catalina.valves.AccessLogValve"
checkExists="true"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="access_log"
requestAttributesEnabled="true"
rotatable="false"
suffix=".txt"/>At the command prompt, execute the following command:
tail /storage/log/vmware/vcac/access_log.YYYY-MM-dd.txt
Note: Substitute the actual date in the file name.
If the HTTP status codes are not being recorded, this is a finding.
Note: HTTP status codes are 3-digit codes, which are recorded immediately after "HTTP/1.1"SRG-APP-000100-WSR-000064<GroupDescription></GroupDescription>VRAU-TC-000235tc Server HORIZON must produce log records containing sufficient information to establish the identity of any user/subject or process associated with an event.<VulnDiscussion>After a security incident has occurred, investigators will often review log files to determine what happened. tc Server HORIZON must create a log entry when users access the system, and the system authenticates the users.
The logs must contain information about user sessions to include what type of event occurred, when (date and time) events occurred, where within the server the events occurred, the client source of the events, the outcome (success or failure) of the event, the identity of the user/subject/process associated with the event.
As a Tomcat derivative, tc Server can be configured with an AccessLogValve. A Valve element represents a component that can be inserted into the request processing pipeline. The pattern attribute of the AccessLogValve controls which data gets logged. The %u parameter will record the remote user that was authenticated. Knowing the authenticated user could be crucial to know in an investigation.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100619V-89969CCI-001487Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to and locate <Host>.
Configure the <Host> node with the <AccessLogValve> below.
Note: The "AccessLogValve" should be configured as follows:
<Valve className="org.apache.catalina.valves.AccessLogValve"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="localhost_access_log."
suffix=".txt"/>At the command prompt, execute the following command:
tail /storage/log/vmware/horizon/localhost_access_log.YYYY-MM-dd.txt
Note: Substitute the actual date in the file name.
If the identity of the user is not being recorded, this is a finding.SRG-APP-000100-WSR-000064<GroupDescription></GroupDescription>VRAU-TC-000240tc Server VCO must produce log records containing sufficient information to establish the identity of any user/subject or process associated with an event.<VulnDiscussion>After a security incident has occurred, investigators will often review log files to determine what happened. tc Server HORIZON must create a log entry when users access the system, and the system authenticates the users.
The logs must contain information about user sessions to include what type of event occurred, when (date and time) events occurred, where within the server the events occurred, the client source of the events, the outcome (success or failure) of the event, the identity of the user/subject/process associated with the event.
As a Tomcat derivative, tc Server can be configured with an AccessLogValve. A Valve element represents a component that can be inserted into the request processing pipeline. The pattern attribute of the AccessLogValve controls which data gets logged. The %u parameter will record the remote user that was authenticated. Knowing the authenticated user could be crucial to know in an investigation.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100621V-89971CCI-001487Navigate to and open /etc/vco/app-server/server.xml.
Navigate to and locate <Host>.
Configure the <Host> node with the <AccessLogValve> below.
Note: The "AccessLogValve" should be configured as follows:
<Valve className="org.apache.catalina.valves.AccessLogValve"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="localhost_access_log."
suffix=".txt"/>At the command prompt, execute the following command:
tail /storage/log/vmware/vco/app-server/localhost_access_log.txt
If the identity of the user is not being recorded, this is a finding.SRG-APP-000100-WSR-000064<GroupDescription></GroupDescription>VRAU-TC-000245tc Server VCAC must produce log records containing sufficient information to establish the identity of any user/subject or process associated with an event.<VulnDiscussion>After a security incident has occurred, investigators will often review log files to determine what happened. tc Server HORIZON must create a log entry when users access the system, and the system authenticates the users.
The logs must contain information about user sessions to include what type of event occurred, when (date and time) events occurred, where within the server the events occurred, the client source of the events, the outcome (success or failure) of the event, the identity of the user/subject/process associated with the event.
As a Tomcat derivative, tc Server can be configured with an AccessLogValve. A Valve element represents a component that can be inserted into the request processing pipeline. The pattern attribute of the AccessLogValve controls which data gets logged. The %u parameter will record the remote user that was authenticated. Knowing the authenticated user could be crucial to know in an investigation.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100623V-89973CCI-001487Navigate to and open /etc/vcac/server.xml.
Navigate to and locate <Host>.
Configure the <Host> node with the <AccessLogValve> below.
Note: The "AccessLogValve" should be configured as follows:
<Valve className="org.apache.catalina.valves.AccessLogValve"
checkExists="true"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="access_log"
requestAttributesEnabled="true"
rotatable="false"
suffix=".txt"/>At the command prompt, execute the following command:
tail /storage/log/vmware/vcac/access_log.YYYY-MM-dd.txt
Note: Substitute the actual date in the file name.
If the identity of the user is not being recorded, this is a finding.SRG-APP-000108-WSR-000166<GroupDescription></GroupDescription>VRAU-TC-000250tc Server ALL must use a logging mechanism that is configured to alert the ISSO and SA in the event of a processing failure.<VulnDiscussion>Reviewing log data allows an investigator to recreate the path of an attacker and to capture forensic data for later use. Log data is also essential to system administrators in their daily administrative duties on the hosted system or within the hosted applications.
If the logging system begins to fail, events will not be recorded. Organizations must define logging failure events, at which time the application or the logging mechanism the application utilizes will provide a warning to the ISSO and SA at a minimum.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100625V-89975CCI-000139Configure the web server to provide an alert to the ISSO and SA when log processing failures occur.
If the web server cannot generate alerts, utilize an external logging system that meets this criterion.Interview the ISSO.
Determine if log data and records are configured to alert the ISSO and SA in the event of processing failure.
If log data and records are not configured to alert the ISSO and SA in the event of processing failure, this is a finding.SRG-APP-000118-WSR-000068<GroupDescription></GroupDescription>VRAU-TC-000260tc Server HORIZON log files must only be accessible by privileged users.<VulnDiscussion>Log data is essential in the investigation of events. If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity would be difficult, if not impossible, to achieve. In addition, access to log records provides information an attacker could potentially use to their advantage since each event record might contain communication ports, protocols, services, trust relationships, user names, etc.
The web server must protect the log data from unauthorized read, write, copy, etc. This can be done by the web server if the web server is also doing the logging function. The web server may also use an external log system. In either case, the logs must be protected from access by non-privileged users.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100627V-89977CCI-000162At the command prompt, execute the following commands:
chmod 640 /storage/log/vmware/horizon/<file>
sed -i "/^[^#]*UMASK/ c\UMASK 077" /etc/login.defs
Note: Substitute <file> with the listed file.At the command prompt, execute the following command:
ls -lL /storage/log/vmware/horizon
If any log files have permissions less restrictive than "640", this is a finding.SRG-APP-000118-WSR-000068<GroupDescription></GroupDescription>VRAU-TC-000265tc Server VCO log files must only be accessible by privileged users.<VulnDiscussion>Log data is essential in the investigation of events. If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity would be difficult, if not impossible, to achieve. In addition, access to log records provides information an attacker could potentially use to their advantage since each event record might contain communication ports, protocols, services, trust relationships, user names, etc.
The web server must protect the log data from unauthorized read, write, copy, etc. This can be done by the web server if the web server is also doing the logging function. The web server may also use an external log system. In either case, the logs must be protected from access by non-privileged users.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100629V-89979CCI-000162At the command prompt, execute the following commands:
chmod 640 /storage/log/vmware/vco/app-server/<file>
sed -i "/^[^#]*UMASK/ c\UMASK 077" /etc/login.defs
Note: Substitute <file> with the listed file.At the command prompt, execute the following command:
ls -lL /storage/log/vmware/vco/app-server
If any log files have permissions less restrictive than "640", this is a finding.SRG-APP-000118-WSR-000068<GroupDescription></GroupDescription>VRAU-TC-000270tc Server VCAC log files must only be accessible by privileged users.<VulnDiscussion>Log data is essential in the investigation of events. If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity would be difficult, if not impossible, to achieve. In addition, access to log records provides information an attacker could potentially use to their advantage since each event record might contain communication ports, protocols, services, trust relationships, user names, etc.
The web server must protect the log data from unauthorized read, write, copy, etc. This can be done by the web server if the web server is also doing the logging function. The web server may also use an external log system. In either case, the logs must be protected from access by non-privileged users.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100631V-89981CCI-000162At the command prompt, execute the following commands:
chmod 640 /storage/log/vmware/vcac/<file>
sed -i "/^[^#]*UMASK/ c\UMASK 077" /etc/login.defs
Note: Substitute <file> with the listed file.At the command prompt, execute the following command:
ls -lL /storage/log/vmware/vcac
If any log files have permissions less restrictive than "640", this is a finding.SRG-APP-000119-WSR-000069<GroupDescription></GroupDescription>VRAU-TC-000275tc Server HORIZON log files must be protected from unauthorized modification.<VulnDiscussion>Log data is essential in the investigation of events. The accuracy of the information is always pertinent. Information that is not accurate does not help in the revealing of potential security risks and may hinder the early discovery of a system compromise. One of the first steps an attacker will undertake is the modification or deletion of log records to cover his tracks and prolong discovery.
The web server must protect the log data from unauthorized modification. This can be done by the web server if the web server is also doing the logging function. The web server may also use an external log system. In either case, the logs must be protected from modification by non-privileged users.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100633V-89983CCI-000163At the command prompt, execute the following command:
chown <owner>:<owner> /storage/log/vmware/vcac/<file>
Note: Substitute <file> with the listed file.
Note: Substitute <owner> with the correct value below.
The following files should be owned by "vcac":
access_log
catalina.out
gc_logs
host-manager
localhost
manager
tc Server.pid
The following files should be owned by "root":
system-config-history
telemetry
toolsgc
vcac-configAt the command prompt, execute the following command:
ls -lL /storage/log/vmware/vcac
If any log files are not owned by "root" or "vcac", this is a finding.
The following files should be owned by "vcac":
access_log
catalina.out
gc_logs
host-manager
localhost
manager
tc Server.pid
The following files should be owned by "root":
system-config-history
telemetry
toolsgc
vcac-configSRG-APP-000119-WSR-000069<GroupDescription></GroupDescription>VRAU-TC-000280tc Server VCO log files must be protected from unauthorized modification.<VulnDiscussion>Log data is essential in the investigation of events. The accuracy of the information is always pertinent. Information that is not accurate does not help in the revealing of potential security risks and may hinder the early discovery of a system compromise. One of the first steps an attacker will undertake is the modification or deletion of log records to cover his tracks and prolong discovery.
The web server must protect the log data from unauthorized modification. This can be done by the web server if the web server is also doing the logging function. The web server may also use an external log system. In either case, the logs must be protected from modification by non-privileged users.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100635V-89985CCI-000163At the command prompt, execute the following command:
chown vco:vco /storage/log/vmware/vco/app-server/<file>
Note: Substitute <file> with the listed file.At the command prompt, execute the following command:
ls -lL /storage/log/vmware/vco/app-server
If any log files are not owned by "vco", this is a finding.SRG-APP-000119-WSR-000069<GroupDescription></GroupDescription>VRAU-TC-000285tc Server VCAC log files must be protected from unauthorized modification.<VulnDiscussion>Log data is essential in the investigation of events. The accuracy of the information is always pertinent. Information that is not accurate does not help in the revealing of potential security risks and may hinder the early discovery of a system compromise. One of the first steps an attacker will undertake is the modification or deletion of log records to cover his tracks and prolong discovery.
The web server must protect the log data from unauthorized modification. This can be done by the web server if the web server is also doing the logging function. The web server may also use an external log system. In either case, the logs must be protected from modification by non-privileged users.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100637V-89987CCI-000163At the command prompt, execute the following command:
Set the owner & group of these files: access_log.txt, audit.log, catalina.log, catalina.out, gc_logs.log.0.current, host-manager.log, localhost.log, manager.log, and tomcat.pid to vcac, with the following command:
chown vcac:vcac /storage/log/vmware/vcac/<file>
Set all other files not listed above to the owner and group of root, with the following command:
chown root:root /storage/log/vmware/vcac/<file>
Note: Substitute <file> with the listed file.At the command prompt, execute the following command:
ls -lL /storage/log/vmware/vcac
If any log files are not owned by "root" or "vcac", this is a finding.SRG-APP-000120-WSR-000070<GroupDescription></GroupDescription>VRAU-TC-000290tc Server HORIZON log files must be protected from unauthorized deletion.<VulnDiscussion>Log data is essential in the investigation of events. The accuracy of the information is always pertinent. Information that is not accurate does not help in the revealing of potential security risks and may hinder the early discovery of a system compromise. One of the first steps an attacker will undertake is the modification or deletion of audit records to cover his tracks and prolong discovery.
The web server must protect the log data from unauthorized deletion. This can be done by the web server if the web server is also doing the logging function. The web server may also use an external log system. In either case, the logs must be protected from deletion by non-privileged users.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100639V-89989CCI-000164At the command prompt, execute the following command:
chown horizon:www /storage/log/vmware/horizon/<file>
Note: Substitute <file> with the listed file.At the command prompt, execute the following command:
ls -lL /storage/log/vmware/horizon
If any log files are not group-owned by "www", this is a finding.SRG-APP-000120-WSR-000070<GroupDescription></GroupDescription>VRAU-TC-000295tc Server VCO log files must be protected from unauthorized deletion.<VulnDiscussion>Log data is essential in the investigation of events. The accuracy of the information is always pertinent. Information that is not accurate does not help in the revealing of potential security risks and may hinder the early discovery of a system compromise. One of the first steps an attacker will undertake is the modification or deletion of audit records to cover his tracks and prolong discovery.
The web server must protect the log data from unauthorized deletion. This can be done by the web server if the web server is also doing the logging function. The web server may also use an external log system. In either case, the logs must be protected from deletion by non-privileged users.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100641V-89991CCI-000164At the command prompt, execute the following command:
chown vco:vco /storage/log/vmware/vco/app-server/<file>
Note: Substitute <file> with the listed file.At the command prompt, execute the following command:
ls -lL /storage/log/vmware/vco/app-server
If any log files are not group-owned by "vco", this is a finding.SRG-APP-000120-WSR-000070<GroupDescription></GroupDescription>VRAU-TC-000300tc Server VCAC log files must be protected from unauthorized deletion.<VulnDiscussion>Log data is essential in the investigation of events. The accuracy of the information is always pertinent. Information that is not accurate does not help in the revealing of potential security risks and may hinder the early discovery of a system compromise. One of the first steps an attacker will undertake is the modification or deletion of audit records to cover his tracks and prolong discovery.
The web server must protect the log data from unauthorized deletion. This can be done by the web server if the web server is also doing the logging function. The web server may also use an external log system. In either case, the logs must be protected from deletion by non-privileged users.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100643V-89993CCI-000164At the command prompt, execute the following command:
chown root:root /storage/log/vmware/vcac/<file>
Note: Substitute <file> with the listed file.At the command prompt, execute the following command:
ls -lL /storage/log/vmware/vcac
If any log files are not group-owned by "root", this is a finding.SRG-APP-000125-WSR-000071<GroupDescription></GroupDescription>VRAU-TC-000305tc Server ALL log data and records must be backed up onto a different system or media.<VulnDiscussion>Protection of tc Server ALL log data includes assuring log data is not accidentally lost or deleted. Backing up tc Server ALL log records to an unrelated system or onto separate media than the system the web server is actually running on helps to assure that, in the event of a catastrophic system failure, the log records will be retained.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100645V-89995CCI-001348Ensure log data and records are being backed up to a different system or separate media.Interview the ISSO.
Determine if log data and records are not being backed up onto a different system or media.
If log data and records are not being backed up onto a different system or media, this is a finding.SRG-APP-000131-WSR-000051<GroupDescription></GroupDescription>VRAU-TC-000310tc Server ALL server files must be verified for their integrity (e.g., checksums and hashes) before becoming part of the production web server.<VulnDiscussion>Being able to verify that a patch, upgrade, certificate, etc., being added to the web server is unchanged from the producer of the file is essential for file validation and non-repudiation of the information.
VMware delivers product updates and patches regularly. It is crucial that system administrators coordinate installation of product updates with the site ISSO to ensure that only valid files are uploaded onto the system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100647V-89997CCI-001749Configure the web server to verify object integrity before becoming part of the production web server or utilize an external tool designed to meet this requirement.Interview the ISSO.
Determine whether web server files are being fully reviewed, tested, and signed before being implemented into the production environment.
If the web server files are not being fully reviewed, tested, and signed before being implemented into the production environment, this is a finding.SRG-APP-000131-WSR-000073<GroupDescription></GroupDescription>VRAU-TC-000315tc Server ALL expansion modules must be fully reviewed, tested, and signed before they can exist on a production web server.<VulnDiscussion>In the case of a production web server, areas for content development and testing will not exist, as this type of content is only permissible on a development website. The process of developing on a functional production website entails a degree of trial and error and repeated testing. This process is often accomplished in an environment where debugging, sequencing, and formatting of content are the main goals. The opportunity for a malicious user to obtain files that reveal business logic and logon schemes is high in this situation. The existence of such immature content on a web server represents a significant security risk that is totally avoidable.
VMware delivers product updates and patches regularly. It is crucial that system administrators coordinate installation of product updates with the site ISSO to ensure that only valid files are uploaded onto the system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100649V-89999CCI-001749Configure the web server to enforce, internally or through an external utility, the review, testing and signing of modules before implementation into the production environment.Interview the ISSO.
Determine whether expansion modules are being fully reviewed, tested, and signed before being implemented into the production environment.
If the expansion modules are not being fully reviewed, tested, and signed before being implemented into the production environment, this is a finding.SRG-APP-000141-WSR-000015<GroupDescription></GroupDescription>VRAU-TC-000320tc Server HORIZON must not use the tomcat-users XML database for user management.<VulnDiscussion>User management and authentication can be an essential part of any application hosted by the web server. Along with authenticating users, the user management function must perform several other tasks like password complexity, locking users after a configurable number of failed logons, and management of temporary and emergency accounts; and all of this must be done enterprise-wide.
For historical reasons, tc Server contains a tomcat-users.xml file in the configuration directory. This file was originally used by standalone applications that did not authenticate against an LDAP or other enterprise mechanism. vRA does not use this file.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100651V-90001CCI-000381Contact the ISSO and/or SA.
Determine why user data is being stored in "tomcat-users.xml".
If the user data is not required then it should be removed.
The vRA appliance does not maintain user data in this file by default.At the command prompt, execute the following command:
cat /opt/vmware/horizon/workspace/conf/tomcat-users.xml
If "tomcat-users.xml" file contains any user information, this is a finding.SRG-APP-000141-WSR-000015<GroupDescription></GroupDescription>VRAU-TC-000325tc Server VCO must not use the tomcat-users XML database for user management.<VulnDiscussion>User management and authentication can be an essential part of any application hosted by the web server. Along with authenticating users, the user management function must perform several other tasks like password complexity, locking users after a configurable number of failed logons, and management of temporary and emergency accounts; and all of this must be done enterprise-wide.
For historical reasons, tc Server contains a tomcat-users.xml file in the configuration directory. This file was originally used by standalone applications that did not authenticate against an LDAP or other enterprise mechanism. vRA does not use this file.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100653V-90003CCI-000381Contact the ISSO and/or SA.
Determine why user data is being stored in "tomcat-users.xml".
If the user data is not required then it should be removed.
The vRA appliance does not maintain user data in this file by default.At the command prompt, execute the following command:
cat /etc/vco/app-server/tomcat-users.xml
If "tomcat-users.xml" file contains any user information, this is a finding.SRG-APP-000141-WSR-000015<GroupDescription></GroupDescription>VRAU-TC-000330tc Server VCAC must not use the tomcat-users XML database for user management.<VulnDiscussion>User management and authentication can be an essential part of any application hosted by the web server. Along with authenticating users, the user management function must perform several other tasks like password complexity, locking users after a configurable number of failed logons, and management of temporary and emergency accounts; and all of this must be done enterprise-wide.
For historical reasons, tc Server contains a tomcat-users.xml file in the configuration directory. This file was originally used by standalone applications that did not authenticate against an LDAP or other enterprise mechanism. vRA does not use this file.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100655V-90005CCI-000381Contact the ISSO and/or SA.
Determine why user data is being stored in "tomcat-users.xml".
If the user data is not required then it should be removed.
The vRA appliance does not maintain user data in this file by default.At the command prompt, execute the following command:
cat /etc/vcac/tomcat-users.xml
If "tomcat-users.xml" file contains any user information, this is a finding.SRG-APP-000141-WSR-000075<GroupDescription></GroupDescription>VRAU-TC-000335tc Server ALL must only contain services and functions necessary for operation.<VulnDiscussion>A web server can provide many features, services, and processes. Some of these may be deemed unnecessary or too unsecure to run on a production DoD system.
The web server must provide the capability to disable, uninstall, or deactivate functionality and services that are deemed to be non-essential to the web server mission or can adversely impact server performance.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100657V-90007CCI-000381Uninstall or deactivate features, services, and processes not needed by the web server for operation.Interview the ISSO.
Review the web server documentation and deployed configuration to determine if web server features, services, and processes are installed that are not needed for hosted application deployment.
If excessive features, services, and processes are installed, this is a finding.SRG-APP-000141-WSR-000077<GroupDescription></GroupDescription>VRAU-TC-000345tc Server ALL must exclude documentation, sample code, example applications, and tutorials.<VulnDiscussion>Web server documentation, sample code, example applications, and tutorials may be an exploitable threat to a web server because this type of code has not been evaluated and approved. A production web server must only contain components that are operationally necessary (e.g., compiled code, scripts, web-content, etc.).
Any documentation, sample code, example applications, and tutorials must be removed from a production web server. Because tc Server is installed as part of the entire vRA application, and not installed separately, VMware has ensured that all documentation, sample code, example applications, and tutorials have been removed from tc Server as part of the build process.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100659V-90009CCI-000381Remove all documentation, sample code, example applications, and tutorials.Interview the ISSO.
Review the web server documentation and deployed configuration to determine if documentation, sample code, example applications, and tutorials have been removed.
If documentation, sample code, example applications, and tutorials have not been removed, this is a finding.SRG-APP-000141-WSR-000080<GroupDescription></GroupDescription>VRAU-TC-000355tc Server ALL must exclude installation of utility programs, services, plug-ins, and modules not necessary for operation.<VulnDiscussion>Just as running unneeded services and protocols is a danger to the web server at the lower levels of the OSI model, running unneeded utilities and programs is also a danger at the application layer of the OSI model. Office suites, development tools, and graphical editors are examples of such programs that are troublesome.
Because tc Server is installed as part of the entire vRA application, and not installed separately, VMware has ensured that no unnecessary utilities and programs have been included in tc Server.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100995V-90345CCI-000381Remove all utility programs, services, plug-ins, and modules not necessary for operation.Interview the ISSO.
Review the web server documentation and deployed configuration to determine if utility programs, services, plug-ins, and modules not necessary for operation have been removed.
If utility programs, services, plug-ins, and modules not necessary for operation have not been removed, this is a finding.SRG-APP-000141-WSR-000081<GroupDescription></GroupDescription>VRAU-TC-000360tc Server ALL must have Multipurpose Internet Mail Extensions (MIME) that invoke OS shell programs disabled.<VulnDiscussion>Controlling what a user of a hosted application can access is part of the security posture of the web server. Any time a user can access more functionality than is needed for the operation of the hosted application poses a security issue. A user with too much access can view information that is not needed for the user's job role, or the user could use the function in an unintentional manner.
A MIME tells the web server what type of program various file types and extensions are and what external utilities or programs are needed to execute the file type.
tc Server configures MIME types in the web.xml file. By ensuring that sh, csh, and shar MIME types are not included in web.xml, the server is protected against malicious users tricking the server into executing shell command files.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100661V-90011CCI-000381Navigate to a file that was listed.
Open the file in a text editor.
Delete any of the following types:
application/x-sh
application/x-shar
application/x-csh
application/x-kshAt the command prompt, execute the following command:
find / -name 'web.xml' -print0 | xargs -0r grep -HEn '(x-csh<)|(x-sh<)|(x-shar<)|(x-ksh<)'
If the command produces any output, this is a finding.SRG-APP-000141-WSR-000082<GroupDescription></GroupDescription>VRAU-TC-000365tc Server ALL must have all mappings to unused and vulnerable scripts to be removed.<VulnDiscussion>Scripts allow server side processing on behalf of the hosted application user or as processes needed in the implementation of hosted applications. Removing scripts not needed for application operation or deemed vulnerable helps to secure the web server.
To assure scripts are not added to the web server and run maliciously, those script mappings that are not needed or used by the web server for hosted application operation must be removed. Because tc Server is installed as part of the entire vRA application, and not installed separately, VMware has ensured that scripts not needed for application operation or deemed vulnerable have been removed from tc Server.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100663V-90013CCI-000381Remove script mappings that are not needed for web server and hosted application operation.Interview the ISSO.
Review the web server documentation and deployed configuration to determine if all mappings to unused and vulnerable scripts to be removed.
If all mappings to unused and vulnerable scripts have not been removed, this is a finding.SRG-APP-000141-WSR-000083<GroupDescription></GroupDescription>VRAU-TC-000370tc Server HORIZON must have mappings set for Java Servlet Pages.<VulnDiscussion>Resource mapping is the process of tying a particular file type to a process in the web server that can serve that type of file to a requesting client and to identify which file types are not to be delivered to a client.
By not specifying which files can and which files cannot be served to a user, the web server could deliver to a user web server configuration files, log files, password files, etc.
As a derivative of the Apache Tomcat project, tc Server is a java-based web server. As a result, the main file extension used by tc Server is *.jsp. This check ensures that the *.jsp file type has been properly mapped to servlets.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100665V-90015CCI-000381Navigate to and open /opt/vmware/horizon/workspace/conf/web.xml.
Navigate to and locate the mapping for the JSP servlet. It is the <servlet-mapping> node that contains <servlet-name>jsp</servlet-name>.
Configure the <servlet-mapping> node to look like the code snippet below:
<!-- The mappings for the JSP servlet -->
<servlet-mapping>
<servlet-name>jsp</servlet-name>
<url-pattern>*.jsp</url-pattern>
<url-pattern>*.jspx</url-pattern>
</servlet-mapping>At the command prompt, execute the following command:
grep -E '<url-pattern>\*\.jsp</url-pattern>' -B 2 -A 2 /opt/vmware/horizon/workspace/conf/web.xml
If the jsp and jspx file extensions have not been mapped to the JSP servlet, this is a finding.SRG-APP-000141-WSR-000083<GroupDescription></GroupDescription>VRAU-TC-000375tc Server VCO must have mappings set for Java Servlet Pages.<VulnDiscussion>Resource mapping is the process of tying a particular file type to a process in the web server that can serve that type of file to a requesting client and to identify which file types are not to be delivered to a client.
By not specifying which files can and which files cannot be served to a user, the web server could deliver to a user web server configuration files, log files, password files, etc.
As a derivative of the Apache Tomcat project, tc Server is a java-based web server. As a result, the main file extension used by tc Server is *.jsp. This check ensures that the *.jsp file type has been properly mapped to servlets.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100667V-90017CCI-000381Navigate to and open /etc/vco/app-server/web.xml.
Navigate to and locate the mapping for the JSP servlet. It is the <servlet-mapping> node that contains <servlet-name>jsp</servlet-name>.
Configure the <servlet-mapping> node to look like the code snippet below:
<!-- The mappings for the JSP servlet -->
<servlet-mapping>
<servlet-name>jsp</servlet-name>
<url-pattern>*.jsp</url-pattern>
<url-pattern>*.jspx</url-pattern>
</servlet-mapping>At the command prompt, execute the following command:
grep -E '<url-pattern>\*\.jsp</url-pattern>' -B 2 -A 2 /etc/vco/app-server/web.xml
If the jsp and jspx file extensions have not been mapped to the JSP servlet, this is a finding.SRG-APP-000141-WSR-000083<GroupDescription></GroupDescription>VRAU-TC-000380tc Server VCAC must have mappings set for Java Servlet Pages.<VulnDiscussion>Resource mapping is the process of tying a particular file type to a process in the web server that can serve that type of file to a requesting client and to identify which file types are not to be delivered to a client.
By not specifying which files can and which files cannot be served to a user, the web server could deliver to a user web server configuration files, log files, password files, etc.
As a derivative of the Apache Tomcat project, tc Server is a java-based web server. As a result, the main file extension used by tc Server is *.jsp. This check ensures that the *.jsp file type has been properly mapped to servlets.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100669V-90019CCI-000381Navigate to and open /etc/vcac/web.xml.
Navigate to and locate the mapping for the JSP servlet. It is the <servlet-mapping> node that contains <servlet-name>jsp</servlet-name>.
Configure the <servlet-mapping> node to look like the code snippet below:
<!-- The mappings for the JSP servlet -->
<servlet-mapping>
<servlet-name>jsp</servlet-name>
<url-pattern>*.jsp</url-pattern>
<url-pattern>*.jspx</url-pattern>
</servlet-mapping>At the command prompt, execute the following command:
grep -E '<url-pattern>\*\.jsp</url-pattern>' -B 2 -A 2 /etc/vcac/web.xml
If the jsp and jspx file extensions have not been mapped to the JSP servlet, this is a finding.SRG-APP-000141-WSR-000085<GroupDescription></GroupDescription>VRAU-TC-000385tc Server ALL must not have the Web Distributed Authoring (WebDAV) servlet installed.<VulnDiscussion>A web server can be installed with functionality that, just by its nature, is not secure. Web Distributed Authoring (WebDAV) is an extension to the HTTP protocol that, when developed, was meant to allow users to create, change, and move documents on a server, typically a web server or web share. Allowing this functionality, development, and deployment is much easier for web authors.
WebDAV is not widely used and has serious security concerns because it may allow clients to modify unauthorized files on the web server.
As an extension to Tomcat, tc Server VCO-CFG uses the org.apache.catalina.servlets.WebdavServlet servlet to provide WebDAV services. Because the WebDAV service has been found to have an excessive number of vulnerabilities, this servlet must not be installed.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100671V-90021CCI-000381Navigate to and open all listed files.
Navigate to and locate the mapping for the JSP servlet. It is the <servlet-mapping> node that contains <servlet-name>webdav</servlet-name>.
Remove the WebDAV servlet and any mapping associated with it.At the command prompt, execute the following command:
find / -name 'web.xml' -print0 | xargs -0r grep -HEn 'webdav'
If the command produces any output, this is a finding.SRG-APP-000141-WSR-000086<GroupDescription></GroupDescription>VRAU-TC-000390tc Server HORIZON must be configured with memory leak protection.<VulnDiscussion>The Java Runtime environment can cause a memory leak or lock files under certain conditions. Without memory leak protection, tc Server HORIZON can continue to consume system resources that will lead to OutOfMemoryErrors when reloading web applications.
Memory leaks occur when JRE code uses the context class loader to load a singleton as this will cause a memory leak if a web application class loader happens to be the context class loader at the time. The JreMemoryLeakPreventionListener class is designed to initialize these singletons when Tomcat's common class loader is the context class loader.
Proper use of JRE memory leak protection will ensure that the hosted application does not consume system resources and cause an unstable environment.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100673V-90023CCI-000381Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to the <Server> node.
Add '<Listener className="org.apache.catalina.core.JreMemoryLeakPreventionListener"/>' to the <Server> node.At the command prompt, execute the following command:
grep JreMemoryLeakPreventionListener /opt/vmware/horizon/workspace/conf/server.xml
If the JreMemoryLeakPreventionListener <Listener> node is not listed, this is a finding.SRG-APP-000141-WSR-000086<GroupDescription></GroupDescription>VRAU-TC-000395tc Server VCO must be configured with memory leak protection.<VulnDiscussion>The Java Runtime environment can cause a memory leak or lock files under certain conditions. Without memory leak protection, tc Server HORIZON can continue to consume system resources that will lead to OutOfMemoryErrors when reloading web applications.
Memory leaks occur when JRE code uses the context class loader to load a singleton as this will cause a memory leak if a web application class loader happens to be the context class loader at the time. The JreMemoryLeakPreventionListener class is designed to initialize these singletons when Tomcat's common class loader is the context class loader.
Proper use of JRE memory leak protection will ensure that the hosted application does not consume system resources and cause an unstable environment.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100675V-90025CCI-000381Navigate to and open /etc/vco/app-server/server.xml.
Navigate to the <Server> node.
Add '<Listener className="org.apache.catalina.core.JreMemoryLeakPreventionListener"/>' to the <Server> node.At the command prompt, execute the following command:
grep JreMemoryLeakPreventionListener /etc/vco/app-server/server.xml
If the JreMemoryLeakPreventionListener <Listener> node is not listed, this is a finding.SRG-APP-000141-WSR-000086<GroupDescription></GroupDescription>VRAU-TC-000400tc Server VCAC must be configured with memory leak protection.<VulnDiscussion>The Java Runtime environment can cause a memory leak or lock files under certain conditions. Without memory leak protection, tc Server VCAC can continue to consume system resources that will lead to OutOfMemoryErrors when reloading web applications.
Memory leaks occur when JRE code uses the context class loader to load a singleton as this will cause a memory leak if a web application class loader happens to be the context class loader at the time. The JreMemoryLeakPreventionListener class is designed to initialize these singletons when Tomcat's common class loader is the context class loader.
Proper use of JRE memory leak protection will ensure that the hosted application does not consume system resources and cause an unstable environment.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100677V-90027CCI-000381Navigate to and open /etc/vcac/server.xml.
Navigate to the <Server> node.
Add '<Listener className="org.apache.catalina.core.JreMemoryLeakPreventionListener"/>' to the <Server> node.At the command prompt, execute the following command:
grep JreMemoryLeakPreventionListener /etc/vcac/server.xml
If the JreMemoryLeakPreventionListener <Listener> node is not listed, this is a finding.SRG-APP-000141-WSR-000087<GroupDescription></GroupDescription>VRAU-TC-000410tc Server VCO must not have any symbolic links in the web content directory tree.<VulnDiscussion>A web server is designed to deliver content and execute scripts or applications on the request of a client or user. Containing user requests to files in the directory tree of the hosted web application and limiting the execution of scripts and applications guarantees that the user is not accessing information protected outside the application's realm.
By checking that no symblic links exist in the document root, the web server is protected from users jumping outside the hosted application directory tree and gaining access to the other directories, including the system root.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100679V-90029CCI-000381At the command prompt, execute the following commands:
Note: Replace <file_name> for the name of any files that were returned.
unlink <file_name>
Repeat the commands for each file that was returned.At the command prompt, execute the following command:
ls -lR /usr/lib/vco/configuration/webapps | grep '^l'
If the command produces any output, this is a finding.SRG-APP-000142-WSR-000089<GroupDescription></GroupDescription>VRAU-TC-000420tc Server HORIZON must be configured to use a specified IP address and port.<VulnDiscussion>The web server must be configured to listen on a specified IP address and port. Without specifying an IP address and port for the web server to utilize, the web server will listen on all IP addresses available to the hosting server. If the web server has multiple IP addresses, i.e., a management IP address, the web server will also accept connections on the management IP address.
Accessing the hosted application through an IP address normally used for non-application functions opens the possibility of user access to resources, utilities, files, ports, and protocols that are protected on the desired application IP address.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100681V-90031CCI-000382Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to each of the <Connector> nodes.
Configure each <Connector> node with the value 'address="XXXXX"'.
Note: Replace XXXXX with the appropriate address for that node.Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to each of the <Connector> nodes.
If either the IP address or the port is not specified for each <Connector>, this is a finding.SRG-APP-000142-WSR-000089<GroupDescription></GroupDescription>VRAU-TC-000425tc Server VCO must be configured to use a specified IP address and port.<VulnDiscussion>The web server must be configured to listen on a specified IP address and port. Without specifying an IP address and port for the web server to utilize, the web server will listen on all IP addresses available to the hosting server. If the web server has multiple IP addresses, i.e., a management IP address, the web server will also accept connections on the management IP address.
Accessing the hosted application through an IP address normally used for non-application functions opens the possibility of user access to resources, utilities, files, ports, and protocols that are protected on the desired application IP address.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100683V-90033CCI-000382Navigate to and open /etc/vco/app-server/server.xml.
Navigate to the <Connector> node.
Configure the <Connector> node with the value 'address="XXXXX"'.
Note: Replace XXXXX with the appropriate address for that node.Navigate to and open /etc/vco/app-server/server.xml.
Navigate to the <Connector> node.
If either the IP address or the port is not specified for the <Connector>, this is a finding.SRG-APP-000142-WSR-000089<GroupDescription></GroupDescription>VRAU-TC-000430tc Server VCAC must be configured to use a specified IP address and port.<VulnDiscussion>The web server must be configured to listen on a specified IP address and port. Without specifying an IP address and port for the web server to utilize, the web server will listen on all IP addresses available to the hosting server. If the web server has multiple IP addresses, i.e., a management IP address, the web server will also accept connections on the management IP address.
Accessing the hosted application through an IP address normally used for non-application functions opens the possibility of user access to resources, utilities, files, ports, and protocols that are protected on the desired application IP address.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100685V-90035CCI-000382Navigate to and open /etc/vcac/server.xml.
Navigate to the <Connector> node.
Configure the <Connector> node with the value 'address="XXXXX"'.
Note: Replace XXXXX with the appropriate address for that node.Navigate to and open /etc/vcac/server.xml.
Navigate to the <Connector> node.
If either the IP address or the port is not specified for the <Connector>, this is a finding.SRG-APP-000172-WSR-000104<GroupDescription></GroupDescription>VRAU-TC-000435tc Server HORIZON must encrypt passwords during transmission.<VulnDiscussion>Data used to authenticate, especially passwords, needs to be protected at all times, and encryption is the standard method for protecting authentication data during transmission. Data used to authenticate can be passed to and from the web server for many reasons.
Examples include data passed from a user to the web server through an HTTPS connection for authentication, the web server authenticating to a backend database for data retrieval and posting, and the web server authenticating to a clustered web server manager for an update.
HTTP connections in tc Server are managed through the Connector object. Setting the Connector's SSLEnabled flag, SSL handshake/encryption/decryption is enabled.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100687V-90037CCI-000197Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to each of the <Connector> nodes.
Configure each <Connector> node with the value 'SSLEnabled="true"'.Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to each of the <Connector> nodes.
If the value of "SSLEnabled" is not set to "true" or is missing, this is a finding.SRG-APP-000172-WSR-000104<GroupDescription></GroupDescription>VRAU-TC-000440tc Server VCAC must encrypt passwords during transmission.<VulnDiscussion>Data used to authenticate, especially passwords, needs to be protected at all times, and encryption is the standard method for protecting authentication data during transmission. Data used to authenticate can be passed to and from the web server for many reasons.
Examples include data passed from a user to the web server through an HTTPS connection for authentication, the web server authenticating to a backend database for data retrieval and posting, and the web server authenticating to a clustered web server manager for an update.
HTTP connections in tc Server are managed through the Connector object. Setting the Connector's SSLEnabled flag, SSL handshake/encryption/decryption is enabled.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100689V-90039CCI-000197Navigate to and open /etc/vcac/server.xml.
Navigate to the <Connector> node.
Configure each <Connector> node with the value 'SSLEnabled="true"'.Navigate to and open /etc/vcac/server.xml.
Navigate to the <Connector> node.
If the value of "SSLEnabled" is not set to "true" or is missing, this is a finding.SRG-APP-000175-WSR-000095<GroupDescription></GroupDescription>VRAU-TC-000445tc Server ALL must validate client certificates, to include all intermediary CAs, to ensure the client-presented certificates are valid and that the entire trust chain is valid.<VulnDiscussion>The DoD standard for authentication is DoD-approved PKI certificates. A certificate’s certification path is the path from the end entity certificate to a trusted root certification authority (CA). Certification path validation is necessary for a relying party to make an informed decision regarding acceptance of an end entity certificate. Certification path validation includes checks such as certificate issuer trust, time validity and revocation status for each certificate in the certification path. Revocation status information for CA and subject certificates in a certification path is commonly provided via certificate revocation lists (CRLs) or online certificate status protocol (OCSP) responses.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100691V-90041CCI-000185If PKI is not being used, this check is Not Applicable.
Validate client certificates in accordance with RFC 5280.If PKI is not being used, this check is Not Applicable.
Interview the ISSO.
Review tc Server ALL configuration to verify that certificates being provided by the client are being validated in accordance with RFC 5280.
If certificates are not being validated in accordance with RFC 5280, this is a finding.SRG-APP-000176-WSR-000096<GroupDescription></GroupDescription>VRAU-TC-000450tc Server ALL must only allow authenticated system administrators to have access to the keystore.<VulnDiscussion>The web server's private key is used to prove the identity of the server to clients and securely exchange the shared secret key used to encrypt communications between the web server and clients.
By gaining access to the private key, an attacker can pretend to be an authorized server and decrypt the SSL traffic between a client and the web server.
tc Server stores the server's private key in a keystore file. The vRA keystore file is tcserver.keystore, and this file must be protected to only allow system administrators and other authorized users to have access to it.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100997V-90347CCI-000186At the command prompt, execute the following commands:
chown horizon:www /opt/vmware/horizon/workspace/conf/tcserver.keystore
chmod 640 /opt/vmware/horizon/workspace/conf/tcserver.keystoreAt the command prompt, execute the following command:
ls -al /opt/vmware/horizon/workspace/conf/tcserver.keystore
Verify that file permissions are set to "640" or more restrictive. Verify that the owner is horizon and group-owner is www.
If either of these conditions are not met, this is a finding.SRG-APP-000179-WSR-000111<GroupDescription></GroupDescription>VRAU-TC-000460tc Server HORIZON must use cryptographic modules that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance when authenticating users and processes.<VulnDiscussion>Encryption is only as good as the encryption modules utilized. Unapproved cryptographic module algorithms cannot be verified and cannot be relied upon to provide confidentiality or integrity, and DoD data may be compromised due to weak algorithms.
FIPS 140-2 is the current standard for validating cryptographic modules and NSA Type-X (where X=1, 2, 3, 4) products are NSA-certified, hardware-based encryption modules.
vRA relies upon the OpenSSL suite of encryption libraries. A special carefully defined software component called the OpenSSL FIPS Object Module has been created from the OpenSSL libraries to provide FIPS 140-2 validated encryption. This Module was designed for compatibility with OpenSSL so that products using the OpenSSL API can be converted to use validated cryptography with minimal effort.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100693V-90043CCI-000803Navigate to and open /opt/vmware/horizon/workspace/conf/catalina.properties.
Navigate to and locate "bio-ssl.cipher.list".
Configure the "bio-ssl.cipher.list" with FIPS 140-2 compliant ciphers.At the command prompt, execute the following command:
grep bio-ssl.cipher.list /opt/vmware/horizon/workspace/conf/catalina.properties
If the value of "bio-ssl.cipher.list" does not match the list of FIPS 140-2 ciphers or is missing, this is a finding.
Note: To view a list of FIPS 140-2 ciphers, at the command prompt execute the following command:
openssl ciphers 'FIPS'SRG-APP-000179-WSR-000111<GroupDescription></GroupDescription>VRAU-TC-000465tc Server VCAC must use cryptographic modules that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance when authenticating users and processes.<VulnDiscussion>Encryption is only as good as the encryption modules utilized. Unapproved cryptographic module algorithms cannot be verified and cannot be relied upon to provide confidentiality or integrity, and DoD data may be compromised due to weak algorithms.
FIPS 140-2 is the current standard for validating cryptographic modules and NSA Type-X (where X=1, 2, 3, 4) products are NSA-certified, hardware-based encryption modules.
vRA relies upon the OpenSSL suite of encryption libraries. A special carefully defined software component called the OpenSSL FIPS Object Module has been created from the OpenSSL libraries to provide FIPS 140-2 validated encryption. This Module was designed for compatibility with OpenSSL so that products using the OpenSSL API can be converted to use validated cryptography with minimal effort.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100695V-90045CCI-000803Navigate to and open /etc/vcac/catalina.properties.
Navigate to and locate "cipher".
Configure the "cipher" with FIPS 140-2 compliant ciphers.At the command prompt, execute the following command:
grep cipher /etc/vcac/catalina.properties
If the value of "cipher" does not match the list of FIPS 140-2 ciphers or is missing, this is a finding.
Note: To view a list of FIPS 140-2 ciphers, at the command prompt execute the following command:
openssl ciphers 'FIPS'SRG-APP-000211-WSR-000030<GroupDescription></GroupDescription>VRAU-TC-000475tc Server HORIZON accounts accessing the directory tree, the shell, or other operating system functions and utilities must be administrative accounts.<VulnDiscussion>As a rule, accounts on a web server are to be kept to a minimum. Only administrators, web managers, developers, auditors, and web authors require accounts on the machine hosting the web server. The resources to which these accounts have access must also be closely monitored and controlled. Only the system administrator needs access to all the system's capabilities, while the web administrator and associated staff require access and control of the web content and web server configuration files.
As with all secure web server installations, tc Server files and directories must be adequately protected with correct permissions.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100697V-90047CCI-001082At the command prompt, execute the following command:
chown horizon:www <file_name>
Repeat the command for each file that was returned.
Note: Replace <file_name> for the name of the file that was returned.At the command prompt, execute the following command:
ls -alR /opt/vmware/horizon/workspace/webapps | grep -E '^-' | awk '$3 !~ /horizon|root/ {print}'
If the command produces any output, this is a finding.SRG-APP-000211-WSR-000030<GroupDescription></GroupDescription>VRAU-TC-000480tc Server VCO accounts accessing the directory tree, the shell, or other operating system functions and utilities must be administrative accounts.<VulnDiscussion>As a rule, accounts on a web server are to be kept to a minimum. Only administrators, web managers, developers, auditors, and web authors require accounts on the machine hosting the web server. The resources to which these accounts have access must also be closely monitored and controlled. Only the system administrator needs access to all the system's capabilities, while the web administrator and associated staff require access and control of the web content and web server configuration files.
As with all secure web server installations, tc Server files and directories must be adequately protected with correct permissions.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100699V-90049CCI-001082At the command prompt, execute the following command:
chown vco:vco <file_name>
Repeat the command for each file that was returned.
Note: Replace <file_name> for the name of the file that was returned.At the command prompt, execute the following command:
ls -lL /usr/lib/vco/configuration/webapps
If the listed files are not owned by "vco", this is a finding.SRG-APP-000211-WSR-000030<GroupDescription></GroupDescription>VRAU-TC-000485tc Server VCAC accounts accessing the directory tree, the shell, or other operating system functions and utilities must be administrative accounts.<VulnDiscussion>As a rule, accounts on a web server are to be kept to a minimum. Only administrators, web managers, developers, auditors, and web authors require accounts on the machine hosting the web server. The resources to which these accounts have access must also be closely monitored and controlled. Only the system administrator needs access to all the system's capabilities, while the web administrator and associated staff require access and control of the web content and web server configuration files.
As with all secure web server installations, tc Server files and directories must be adequately protected with correct permissions.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100701V-90051CCI-001082At the command prompt, execute the following command:
If the file was found in /etc/vcac or /usr/lib/vcac/server/webapps, execute the following command:
chown vcac:vcac <file_name>
Note: Replace <file_name> for the name of the file that was returned.At the command prompt, execute the following command:
ls -alR /etc/vcac /usr/lib/vcac/server/webapps | grep -E '^-' | awk '$3 !~ /vcac|root/ {print}'
If the command produces any output, this is a finding.SRG-APP-000211-WSR-000031<GroupDescription></GroupDescription>VRAU-TC-000490tc Server HORIZON web server application directories must not be accessible to anonymous user.<VulnDiscussion>In order to properly monitor the changes to the web server and the hosted applications, logging must be enabled. Along with logging being enabled, each record must properly contain the changes made and the names of those who made the changes.
Allowing anonymous users the capability to change the web server or the hosted application will not generate proper log information that can then be used for forensic reporting in the case of a security issue. Allowing anonymous users to make changes will also grant change capabilities to anybody without forcing a user to authenticate before the changes can be made.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100703V-90053CCI-001082At the command prompt, execute the following command:
chmod 750 <file_name>
Repeat the command for each file that was returned.
Note: Replace <file_name> for the name of the file that was returned.At the command prompt, execute the following command:
ls -alR /opt/vmware/horizon/workspace | grep -E '^-' | awk '$1 !~ /---$/ {print}'
If the command produces any output, this is a finding.SRG-APP-000211-WSR-000031<GroupDescription></GroupDescription>VRAU-TC-000495tc Server VCO web server application directories must not be accessible to anonymous user.<VulnDiscussion>In order to properly monitor the changes to the web server and the hosted applications, logging must be enabled. Along with logging being enabled, each record must properly contain the changes made and the names of those who made the changes.
Allowing anonymous users the capability to change the web server or the hosted application will not generate proper log information that can then be used for forensic reporting in the case of a security issue. Allowing anonymous users to make changes will also grant change capabilities to anybody without forcing a user to authenticate before the changes can be made.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100705V-90055CCI-001082At the command prompt, execute the following command:
chmod 750 <file_name>
Repeat the command for each file that was returned.
Note: Replace <file_name> for the name of the file that was returned.At the command prompt, execute the following command:
ls -alR /etc/vco /usr/lib/vco/app-server | grep -E '^-' | awk '$1 !~ /---$/ {print}'
If anything is returned, this is a finding.SRG-APP-000211-WSR-000031<GroupDescription></GroupDescription>VRAU-TC-000500tc Server VCAC web server application directories must not be accessible to anonymous user.<VulnDiscussion>In order to properly monitor the changes to the web server and the hosted applications, logging must be enabled. Along with logging being enabled, each record must properly contain the changes made and the names of those who made the changes.
Allowing anonymous users the capability to change the web server or the hosted application will not generate proper log information that can then be used for forensic reporting in the case of a security issue. Allowing anonymous users to make changes will also grant change capabilities to anybody without forcing a user to authenticate before the changes can be made.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100707V-90057CCI-001082At the command prompt, execute the following command:
chmod 750 <file_name>
Repeat the command for each file that was returned.
Note: Replace <file_name> for the name of the file that was returned.At the command prompt, execute the following command:
ls -alR /etc/vcac /usr/lib/vcac/server/webapps | grep -E '^-' | awk '$1 !~ /---$/ {print}'
If the command produces any output, this is a finding.SRG-APP-000225-WSR-000074<GroupDescription></GroupDescription>VRAU-TC-000550tc Server ALL baseline must be documented and maintained.<VulnDiscussion>Making certain that the web server has not been updated by an unauthorized user is always a concern. Adding patches, functions, and modules that are untested and not part of the baseline opens the possibility for security risks. The web server must offer, and not hinder, a method that allows for the quick and easy reinstallation of a verified and patched baseline to guarantee the production web server is up-to-date and has not been modified to add functionality or expose security risks.
Because tc Server is installed as part of the entire vRA application, and not installed separately, VMware has ensured that all updates, upgrades, and patches have been thoroughly tested before becoming part of the production build process.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100709V-90059CCI-001190Develop baseline documentation of the tc Server codebase.Interview the ISSO.
Review the web server documentation and deployed configuration to determine if the tc Server code baseline is documented and maintained.
If the tc Server code baseline is not documented and maintained, this is a finding.SRG-APP-000225-WSR-000140<GroupDescription></GroupDescription>VRAU-TC-000555tc Server HORIZON must be built to fail to a known safe state if system initialization fails, shutdown fails, or aborts fail.<VulnDiscussion>Determining a safe state for failure and weighing that against a potential DoS for users depends on what type of application the web server is hosting. For an application presenting publicly available information that is not critical, a safe state for failure might be to shut down for any type of failure; but for an application that presents critical and timely information, a shutdown might not be the best state for all failures.
Performing a proper risk analysis of the hosted applications and configuring the web server according to what actions to take for each failure condition will provide a known fail safe state for the web server. The VMware engineering process includes regression testing of new and modified components before they become part of the production build process.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100711V-90061CCI-001190Navigate to and open /opt/vmware/horizon/workspace/conf/catalina.properties.
Configure the setting "org.apache.catalina.startup.EXIT_ON_INIT_FAILURE" with the value "true".
Note: The word "true" should not be surrounded with any quote characters.At the command line, execute the following command:
grep EXIT_ON_INIT_FAILURE /opt/vmware/horizon/workspace/conf/catalina.properties
If the "org.apache.catalina.startup.EXIT_ON_INIT_FAILURE" setting is not set to "true" or is missing, this is a finding.SRG-APP-000225-WSR-000140<GroupDescription></GroupDescription>VRAU-TC-000560tc Server VCO must be built to fail to a known safe state if system initialization fails, shutdown fails, or aborts fail.<VulnDiscussion>Determining a safe state for failure and weighing that against a potential DoS for users depends on what type of application the web server is hosting. For an application presenting publicly available information that is not critical, a safe state for failure might be to shut down for any type of failure; but for an application that presents critical and timely information, a shutdown might not be the best state for all failures.
Performing a proper risk analysis of the hosted applications and configuring the web server according to what actions to take for each failure condition will provide a known fail safe state for the web server. The VMware engineering process includes regression testing of new and modified components before they become part of the production build process.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100713V-90063CCI-001190Navigate to and open /etc/vco/app-server/catalina.properties.
Configure the setting "org.apache.catalina.startup.EXIT_ON_INIT_FAILURE" with the value "true".
Note: The word "true" should not be surrounded with any quote characters.At the command line, execute the following command:
grep EXIT_ON_INIT_FAILURE /etc/vco/app-server/catalina.properties
If the "org.apache.catalina.startup.EXIT_ON_INIT_FAILURE" setting is not set to "true" or is missing, this is a finding.SRG-APP-000225-WSR-000140<GroupDescription></GroupDescription>VRAU-TC-000565tc Server VCAC must be built to fail to a known safe state if system initialization fails, shutdown fails, or aborts fail.<VulnDiscussion>Determining a safe state for failure and weighing that against a potential DoS for users depends on what type of application the web server is hosting. For an application presenting publicly available information that is not critical, a safe state for failure might be to shut down for any type of failure; but for an application that presents critical and timely information, a shutdown might not be the best state for all failures.
Performing a proper risk analysis of the hosted applications and configuring the web server according to what actions to take for each failure condition will provide a known fail safe state for the web server. The VMware engineering process includes regression testing of new and modified components before they become part of the production build process.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100715V-90065CCI-001190Navigate to and open /etc/vcac/catalina.properties.
Configure the setting "org.apache.catalina.startup.EXIT_ON_INIT_FAILURE" with the value "true".
Note: The word "true" should not be surrounded with any quote characters.At the command line, execute the following command:
grep EXIT_ON_INIT_FAILURE /etc/vcac/catalina.properties
If the "org.apache.catalina.startup.EXIT_ON_INIT_FAILURE" setting is not set to "true" or is missing, this is a finding.SRG-APP-000233-WSR-000146<GroupDescription></GroupDescription>VRAU-TC-000580tc Server HORIZON document directory must be in a separate partition from the web servers system files.<VulnDiscussion>A web server is used to deliver content on the request of a client. The content delivered to a client must be controlled, allowing only hosted application files to be accessed and delivered. To allow a client access to system files of any type is a major security risk that is entirely avoidable. Obtaining such access is the goal of directory traversal and URL manipulation vulnerabilities. To facilitate such access by misconfiguring the web document (home) directory is a serious error. In addition, having the path on the same drive as the system folder compounds potential attacks such as drive space exhaustion.
As a Tomcat derivative, tc Server stores the web applications in a special 'webapps' folder. The Java engine, however, is stored in a separate are of the OS directory structure. For greatest security It is important to verify that the webapps and the Java directories remain separated.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100717V-90067CCI-001084Consult with the ISSO.
Move the tc Server HORIZON /opt/vmware/horizon/workspace/webapps folder to a separate partition.At the command prompt, execute the following commands:
df -k /usr/java/jre-vmware
df -k /opt/vmware/horizon/workspace/webapps
If the two directories above are on the same partition, this is a finding.SRG-APP-000233-WSR-000146<GroupDescription></GroupDescription>VRAU-TC-000585tc Server VCO document directory must be in a separate partition from the web servers system files.<VulnDiscussion>A web server is used to deliver content on the request of a client. The content delivered to a client must be controlled, allowing only hosted application files to be accessed and delivered. To allow a client access to system files of any type is a major security risk that is entirely avoidable. Obtaining such access is the goal of directory traversal and URL manipulation vulnerabilities. To facilitate such access by misconfiguring the web document (home) directory is a serious error. In addition, having the path on the same drive as the system folder compounds potential attacks such as drive space exhaustion.
As a Tomcat derivative, tc Server stores the web applications in a special 'webapps' folder. The Java engine, however, is stored in a separate are of the OS directory structure. For greatest security It is important to verify that the webapps and the Java directories remain separated.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100719V-90069CCI-001084Consult with the ISSO.
Move the tc Server VCO /usr/lib/vco/configuration/webapps folder to a separate partition.At the command prompt, execute the following commands:
df -k /usr/java/jre-vmware
df -k /usr/lib/vco/configuration/webapps
If the two directories above are on the same partition, this is a finding.SRG-APP-000233-WSR-000146<GroupDescription></GroupDescription>VRAU-TC-000590tc Server VCAC document directory must be in a separate partition from the web servers system files.<VulnDiscussion>A web server is used to deliver content on the request of a client. The content delivered to a client must be controlled, allowing only hosted application files to be accessed and delivered. To allow a client access to system files of any type is a major security risk that is entirely avoidable. Obtaining such access is the goal of directory traversal and URL manipulation vulnerabilities. To facilitate such access by misconfiguring the web document (home) directory is a serious error. In addition, having the path on the same drive as the system folder compounds potential attacks such as drive space exhaustion.
As a Tomcat derivative, tc Server stores the web applications in a special 'webapps' folder. The Java engine, however, is stored in a separate are of the OS directory structure. For greatest security It is important to verify that the webapps and the Java directories remain separated.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100721V-90071CCI-001084Consult with the ISSO.
Move the tc Server VCAC /usr/lib/vcac/server/webapps folder to a separate partition.At the command prompt, execute the following commands:
df -k /usr/java/jre-vmware
df -k /usr/lib/vcac/server/webapps
If the two directories above are on the same partition, this is a finding.SRG-APP-000251-WSR-000157<GroupDescription></GroupDescription>VRAU-TC-000610tc Server HORIZON must set URIEncoding to UTF-8.<VulnDiscussion>Invalid user input occurs when a user inserts data or characters into a hosted application's data entry field and the hosted application is unprepared to process that data. This results in unanticipated application behavior, potentially leading to an application compromise. Invalid user input is one of the primary methods employed when attempting to compromise an application.
An attacker can also enter Unicode into hosted applications in an effort to break out of the document home or root home directory or to bypass security checks.
To mitigate against many types of character-based vulnerabilities, tc Server should be configured to use a consistent character set. The URIEncoding attribute on the Connector nodes provides the means for tc Server to enforce a consistent character set encoding.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100729V-90079CCI-001310Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to each of the <Connector> nodes.
Configure each <Connector> node with the value 'URIEncoding="UTF-8"'.Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to each of the <Connector> nodes.
If the value of "URIEncoding" is not set to "UTF-8" or is missing, this is a finding.SRG-APP-000251-WSR-000157<GroupDescription></GroupDescription>VRAU-TC-000615tc Server VCO must set URIEncoding to UTF-8.<VulnDiscussion>Invalid user input occurs when a user inserts data or characters into a hosted application's data entry field and the hosted application is unprepared to process that data. This results in unanticipated application behavior, potentially leading to an application compromise. Invalid user input is one of the primary methods employed when attempting to compromise an application.
An attacker can also enter Unicode into hosted applications in an effort to break out of the document home or root home directory or to bypass security checks.
To mitigate against many types of character-based vulnerabilities, tc Server should be configured to use a consistent character set. The URIEncoding attribute on the Connector nodes provides the means for tc Server to enforce a consistent character set encoding.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100731V-90081CCI-001310Navigate to and open /etc/vco/app-server/server.xml.
Navigate to the <Connector> node.
Configure each <Connector> node with the value 'URIEncoding="UTF-8"'.Navigate to and open /etc/vco/app-server/server.xml.
Navigate to the <Connector> node.
If the value of "URIEncoding" is not set to "UTF-8" or is missing, this is a finding.SRG-APP-000251-WSR-000157<GroupDescription></GroupDescription>VRAU-TC-000620tc Server HORIZON must use the setCharacterEncodingFilter filter.<VulnDiscussion>Invalid user input occurs when a user inserts data or characters into a hosted application's data entry field and the hosted application is unprepared to process that data. This results in unanticipated application behavior, potentially leading to an application compromise. Invalid user input is one of the primary methods employed when attempting to compromise an application.
An attacker can also enter Unicode into hosted applications in an effort to break out of the document home or root home directory or to bypass security checks.
As a web server, tc Server can be vulnerable to character encoding attacks if steps are not taken to mitigate the threat. VMware utilizes the standard Tomcat SetCharacterEncodingFilter to provide a layer of defense against character encoding attacks. Filters are Java objects that performs filtering tasks on either the request to a resource (a servlet or static content), or on the response from a resource, or both.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100733V-90083CCI-001310Navigate to and open /opt/vmware/horizon/workspace/conf/web.xml.
Configure the <web-app> node with the <filter> node listed below.
<filter>
<filter-name>setCharacterEncodingFilter</filter-name>
<filter-class>org.apache.catalina.filters.SetCharacterEncodingFilter</filter-class>
<init-param>
<param-name>encoding</param-name>
<param-value>UTF-8</param-value>
<param-name>ignore</param-name>
<param-value>false</param-value>
</init-param>
<async-supported>true</async-supported>
</filter>Navigate to and open /opt/vmware/horizon/workspace/conf/web.xml.
Verify that the 'setCharacterEncodingFilter' <filter> has been specified.
If the "setCharacterEncodingFilter" filter has not been specified or is commented out, this is a finding.SRG-APP-000251-WSR-000157<GroupDescription></GroupDescription>VRAU-TC-000625tc Server VCO must use the setCharacterEncodingFilter filter.<VulnDiscussion>Invalid user input occurs when a user inserts data or characters into a hosted application's data entry field and the hosted application is unprepared to process that data. This results in unanticipated application behavior, potentially leading to an application compromise. Invalid user input is one of the primary methods employed when attempting to compromise an application.
An attacker can also enter Unicode into hosted applications in an effort to break out of the document home or root home directory or to bypass security checks.
As a web server, tc Server can be vulnerable to character encoding attacks if steps are not taken to mitigate the threat. VMware utilizes the standard Tomcat SetCharacterEncodingFilter to provide a layer of defense against character encoding attacks. Filters are Java objects that performs filtering tasks on either the request to a resource (a servlet or static content), or on the response from a resource, or both.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100735V-90085CCI-001310Navigate to and open /etc/vco/app-server/web.xml.
Configure the <web-app> node with the <filter> node listed below.
<filter>
<filter-name>setCharacterEncodingFilter</filter-name>
<filter-class>org.apache.catalina.filters.SetCharacterEncodingFilter</filter-class>
<init-param>
<param-name>encoding</param-name>
<param-value>UTF-8</param-value>
<param-name>ignore</param-name>
<param-value>false</param-value>
</init-param>
<async-supported>true</async-supported>
</filter>Navigate to and open /etc/vco/app-server/web.xml.
Verify that the 'setCharacterEncodingFilter' <filter> has been specified.
If the "setCharacterEncodingFilter" filter has not been specified or is commented out, this is a finding.SRG-APP-000251-WSR-000157<GroupDescription></GroupDescription>VRAU-TC-000630tc Server VCAC must set URIEncoding to UTF-8.<VulnDiscussion>Invalid user input occurs when a user inserts data or characters into a hosted application's data entry field and the hosted application is unprepared to process that data. This results in unanticipated application behavior, potentially leading to an application compromise. Invalid user input is one of the primary methods employed when attempting to compromise an application.
An attacker can also enter Unicode into hosted applications in an effort to break out of the document home or root home directory or to bypass security checks.
To mitigate against many types of character-based vulnerabilities, tc Server should be configured to use a consistent character set. The URIEncoding attribute on the Connector nodes provides the means for tc Server to enforce a consistent character set encoding.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100737V-90087CCI-001310Navigate to and open /etc/vcac/server.xml.
Navigate to the <Connector> node.
Configure the <Connector> node with the value 'URIEncoding="UTF-8"'.Navigate to and open /etc/vcac/server.xml.
Navigate to the <Connector> node.
If the value of "URIEncoding" is not set to "UTF-8" or is missing, this is a finding.SRG-APP-000251-WSR-000157<GroupDescription></GroupDescription>VRAU-TC-000635tc Server VCAC must use the setCharacterEncodingFilter filter.<VulnDiscussion>Invalid user input occurs when a user inserts data or characters into a hosted application's data entry field and the hosted application is unprepared to process that data. This results in unanticipated application behavior, potentially leading to an application compromise. Invalid user input is one of the primary methods employed when attempting to compromise an application.
An attacker can also enter Unicode into hosted applications in an effort to break out of the document home or root home directory or to bypass security checks.
As a web server, tc Server can be vulnerable to character encoding attacks if steps are not taken to mitigate the threat. VMware utilizes the standard Tomcat SetCharacterEncodingFilter to provide a layer of defense against character encoding attacks. Filters are Java objects that performs filtering tasks on either the request to a resource (a servlet or static content), or on the response from a resource, or both.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100739V-90089CCI-001310Navigate to and open /etc/vcac/web.xml.
Configure the <web-app> node with the <filter> node listed below.
<filter>
<filter-name>setCharacterEncodingFilter</filter-name>
<filter-class>org.apache.catalina.filters.SetCharacterEncodingFilter</filter-class>
<init-param>
<param-name>encoding</param-name>
<param-value>UTF-8</param-value>
<param-name>ignore</param-name>
<param-value>false</param-value>
</init-param>
<async-supported>true</async-supported>
</filter>Navigate to and open /etc/vcac/web.xml.
Verify that the 'setCharacterEncodingFilter' <filter> has been specified.
If the "setCharacterEncodingFilter" filter has not been specified or is commented out, this is a finding.SRG-APP-000266-WSR-000142<GroupDescription></GroupDescription>VRAU-TC-000640tc Server HORIZON must set the welcome-file node to a default web page.<VulnDiscussion>The goal is to completely control the web user's experience in navigating any portion of the web document root directories. Ensuring all web content directories have at least the equivalent of an index.html file is a significant factor to accomplish this end.
Enumeration techniques, such as URL parameter manipulation, rely upon being able to obtain information about the web server's directory structure by locating directories without default pages. In the scenario, the web server will display to the user a listing of the files in the directory being accessed. By having a default hosted application web page, the anonymous web user will not obtain directory browsing information or an error message that reveals the server type and version.
As a web server, tc Server can be vulnerable to enumeration techniques if steps are not taken to mitigate the vulnerability. Ensuring that every document directory has an index.jsp (or equivalent) file is one common sense approach to mitigating the vulnerability.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100741V-90091CCI-001312Navigate to and open /opt/vmware/horizon/workspace/conf/web.xml.
Inspect the file and ensure that it contains the below section:
<welcome-file-list>
<welcome-file>index.html</welcome-file>
<welcome-file>index.htm</welcome-file>
<welcome-file>index.jsp</welcome-file>
</welcome-file-list>At the command prompt, execute the following command:
grep -E -A 4 '<welcome-file-list' /opt/vmware/horizon/workspace/conf/web.xml
If a <welcome-file> node is not set to a default web page, this is a finding.SRG-APP-000266-WSR-000142<GroupDescription></GroupDescription>VRAU-TC-000645tc Server VCO must set the welcome-file node to a default web page.<VulnDiscussion>The goal is to completely control the web user's experience in navigating any portion of the web document root directories. Ensuring all web content directories have at least the equivalent of an index.html file is a significant factor to accomplish this end.
Enumeration techniques, such as URL parameter manipulation, rely upon being able to obtain information about the web server's directory structure by locating directories without default pages. In the scenario, the web server will display to the user a listing of the files in the directory being accessed. By having a default hosted application web page, the anonymous web user will not obtain directory browsing information or an error message that reveals the server type and version.
As a web server, tc Server can be vulnerable to enumeration techniques if steps are not taken to mitigate the vulnerability. Ensuring that every document directory has an index.jsp (or equivalent) file is one common sense approach to mitigating the vulnerability.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100743V-90093CCI-001312Navigate to and open /etc/vco/app-server/web.xml.
Inspect the file and ensure that it contains the below section:
<welcome-file-list>
<welcome-file>index.html</welcome-file>
<welcome-file>index.htm</welcome-file>
<welcome-file>index.jsp</welcome-file>
</welcome-file-list>At the command prompt, execute the following command:
grep -E -A 4 '<welcome-file-list' /etc/vco/app-server/web.xml
If a <welcome-file> node is not set to a default web page, this is a finding.SRG-APP-000266-WSR-000142<GroupDescription></GroupDescription>VRAU-TC-000650tc Server VCAC must set the welcome-file node to a default web page.<VulnDiscussion>The goal is to completely control the web user's experience in navigating any portion of the web document root directories. Ensuring all web content directories have at least the equivalent of an index.html file is a significant factor to accomplish this end.
Enumeration techniques, such as URL parameter manipulation, rely upon being able to obtain information about the web server's directory structure by locating directories without default pages. In the scenario, the web server will display to the user a listing of the files in the directory being accessed. By having a default hosted application web page, the anonymous web user will not obtain directory browsing information or an error message that reveals the server type and version.
As a web server, tc Server can be vulnerable to enumeration techniques if steps are not taken to mitigate the vulnerability. Ensuring that every document directory has an index.jsp (or equivalent) file is one common sense approach to mitigating the vulnerability.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100745V-90095CCI-001312Navigate to and open /etc/vcac/web.xml.
Inspect the file and ensure that it contains the below section:
<welcome-file-list>
<welcome-file>index.html</welcome-file>
<welcome-file>index.htm</welcome-file>
<welcome-file>index.jsp</welcome-file>
</welcome-file-list>At the command prompt, execute the following command:
grep -E -A 4 '<welcome-file-list' /etc/vcac/web.xml
If a <welcome-file> node is not set to a default web page, this is a finding.SRG-APP-000266-WSR-000160<GroupDescription></GroupDescription>VRAU-TC-000660tc Server HORIZON must have the allowTrace parameter set to false.<VulnDiscussion>Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information about the web server and plug-ins or modules being used. When debugging or trace information is enabled in a production web server, information about the web server, such as web server type, version, patches installed, plug-ins and modules installed, type of code being used by the hosted application, and any backends being used for data storage may be displayed. Since this information may be placed in logs and general messages during normal operation of the web server, an attacker does not need to cause an error condition to gain this information.
"Trace" is a technique for a user to request internal information about tc Server. This is useful during product development, but should not be enabled in production. Allowing an attacker to conduct a Trace operation against tc Server will expose information that would be useful to perform a more targeted attack. tc Server provides the allowTrace parameter as means to disable responding to Trace requests.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100747V-90097CCI-001312Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to and locate 'allowTrace="true"'.
Remove the 'allowTrace="true"' setting.At the command prompt, execute the following command:
grep allowTrace /opt/vmware/horizon/workspace/conf/server.xml
If "allowTrace" is set to "true", this is a finding.
Note: If no line is returned this is NOT a finding.SRG-APP-000266-WSR-000160<GroupDescription></GroupDescription>VRAU-TC-000665tc Server VCO must have the allowTrace parameter set to false.<VulnDiscussion>Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information about the web server and plug-ins or modules being used. When debugging or trace information is enabled in a production web server, information about the web server, such as web server type, version, patches installed, plug-ins and modules installed, type of code being used by the hosted application, and any backends being used for data storage may be displayed. Since this information may be placed in logs and general messages during normal operation of the web server, an attacker does not need to cause an error condition to gain this information.
"Trace" is a technique for a user to request internal information about tc Server. This is useful during product development, but should not be enabled in production. Allowing an attacker to conduct a Trace operation against tc Server will expose information that would be useful to perform a more targeted attack. tc Server provides the allowTrace parameter as means to disable responding to Trace requests.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100749V-90099CCI-001312Navigate to and open /etc/vco/app-server/server.xml.
Navigate to and locate 'allowTrace="true"'.
Remove the 'allowTrace="true"' setting.At the command prompt, execute the following command:
grep allowTrace /etc/vco/app-server/server.xml
If "allowTrace" is set to "true", this is a finding.
Note: If no line is returned this is NOT a finding.SRG-APP-000266-WSR-000160<GroupDescription></GroupDescription>VRAU-TC-000670tc Server VCAC must have the allowTrace parameter set to false.<VulnDiscussion>Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information about the web server and plug-ins or modules being used. When debugging or trace information is enabled in a production web server, information about the web server, such as web server type, version, patches installed, plug-ins and modules installed, type of code being used by the hosted application, and any backends being used for data storage may be displayed. Since this information may be placed in logs and general messages during normal operation of the web server, an attacker does not need to cause an error condition to gain this information.
"Trace" is a technique for a user to request internal information about tc Server. This is useful during product development, but should not be enabled in production. Allowing an attacker to conduct a Trace operation against tc Server will expose information that would be useful to perform a more targeted attack. tc Server provides the allowTrace parameter as means to disable responding to Trace requests.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100751V-90101CCI-001312Navigate to and open /etc/vcac/server.xml.
Navigate to and locate 'allowTrace="true"'.
Remove the 'allowTrace="true"' setting.At the command prompt, execute the following command:
grep allowTrace /etc/vcac/server.xml
If "allowTrace" is set to "true", this is a finding.
Note: If no line is returned this is NOT a finding.SRG-APP-000266-WSR-000160<GroupDescription></GroupDescription>VRAU-TC-000675tc Server HORIZON must have the debug option turned off.<VulnDiscussion>Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information about the web server and plug-ins or modules being used. When debugging or trace information is enabled in a production web server, information about the web server, such as web server type, version, patches installed, plug-ins and modules installed, type of code being used by the hosted application, and any backends being used for data storage may be displayed. Since this information may be placed in logs and general messages during normal operation of the web server, an attacker does not need to cause an error condition to gain this information.
As a Tomcat derivative, tc Server can be configured to set the debugging level. By setting the debugging level to zero (0), no debugging information will be provided to a malicious user. This provides a layer of defense to vRA.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100753V-90103CCI-001312Navigate to and open /opt/vmware/horizon/workspace/conf/web.xml.
Navigate to all <debug> nodes that are not set to "0".
Set the <param-value> to "0" in all <param-name>debug</param-name> nodes.
Note: The debug setting should look like the below:
<init-param>
<param-name>debug</param-name>
<param-value>0</param-value>
</init-param>At the command prompt, execute the following command:
grep -En -A 2 -B 1 '<param-name>debug</param-name>' /opt/vmware/horizon/workspace/conf/web.xml
If all instances of the debug parameter are not set to "0", this is a finding.SRG-APP-000266-WSR-000160<GroupDescription></GroupDescription>VRAU-TC-000680tc Server VCO must have the debug option turned off.<VulnDiscussion>Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information about the web server and plug-ins or modules being used. When debugging or trace information is enabled in a production web server, information about the web server, such as web server type, version, patches installed, plug-ins and modules installed, type of code being used by the hosted application, and any backends being used for data storage may be displayed. Since this information may be placed in logs and general messages during normal operation of the web server, an attacker does not need to cause an error condition to gain this information.
As a Tomcat derivative, tc Server can be configured to set the debugging level. By setting the debugging level to zero (0), no debugging information will be provided to a malicious user. This provides a layer of defense to vRA.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100755V-90105CCI-001312Navigate to and open /etc/vco/app-server/web.xml.
Navigate to all <debug> nodes that are not set to "0".
Set the <param-value> to "0" in all <param-name>debug</param-name> nodes.
Note: The debug setting should look like the below:
<init-param>
<param-name>debug</param-name>
<param-value>0</param-value>
</init-param>At the command prompt, execute the following command:
grep -En -A 2 -B 1 '<param-name>debug</param-name>' /etc/vco/app-server/web.xml
If all instances of the debug parameter are not set to "0", this is a finding.SRG-APP-000266-WSR-000160<GroupDescription></GroupDescription>VRAU-TC-000685tc Server VCAC must have the debug option turned off.<VulnDiscussion>Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information about the web server and plug-ins or modules being used. When debugging or trace information is enabled in a production web server, information about the web server, such as web server type, version, patches installed, plug-ins and modules installed, type of code being used by the hosted application, and any backends being used for data storage may be displayed. Since this information may be placed in logs and general messages during normal operation of the web server, an attacker does not need to cause an error condition to gain this information.
As a Tomcat derivative, tc Server can be configured to set the debugging level. By setting the debugging level to zero (0), no debugging information will be provided to a malicious user. This provides a layer of defense to vRA.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100757V-90107CCI-001312Navigate to and open /etc/vcac/web.xml.
Navigate to all <debug> nodes that are not set to "0".
Set the <param-value> to "0" in all <param-name>debug</param-name> nodes.
Note: The debug setting should look like the below:
<init-param>
<param-name>debug</param-name>
<param-value>0</param-value>
</init-param>At the command prompt, execute the following command:
grep -En -A 2 -B 1 '<param-name>debug</param-name>' /etc/vcac/web.xml
If all instances of the debug parameter are not set to "0", this is a finding.SRG-APP-000295-WSR-000134<GroupDescription></GroupDescription>VRAU-TC-000695tc Server HORIZON must set an inactive timeout for sessions.<VulnDiscussion>Leaving sessions open indefinitely is a major security risk. An attacker can easily use an already authenticated session to access the hosted application as the previously authenticated user. By closing sessions after a set period of inactivity, the web server can make certain that those sessions that are not closed through the user logging out of an application are eventually closed.
tc Server provides a session timeout parameter in the web.xml configuration file.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100759V-90109CCI-002361Navigate to and open /opt/vmware/horizon/workspace/conf/web.xml.
Navigate to the <session-config> node.
Add the <session-timeout>30</session-timeout> node setting to the <session-config> node.At the command prompt, execute the following command:
grep session-timeout /opt/vmware/horizon/workspace/conf/web.xml
If the value of <session-timeout> is not "30" or is missing, this is a finding.SRG-APP-000295-WSR-000134<GroupDescription></GroupDescription>VRAU-TC-000700tc Server VCO must set an inactive timeout for sessions.<VulnDiscussion>Leaving sessions open indefinitely is a major security risk. An attacker can easily use an already authenticated session to access the hosted application as the previously authenticated user. By closing sessions after a set period of inactivity, the web server can make certain that those sessions that are not closed through the user logging out of an application are eventually closed.
tc Server provides a session timeout parameter in the web.xml configuration file.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100761V-90111CCI-002361Navigate to and open /etc/vco/app-server/web.xml.
Navigate to the <session-config> node.
Add the <session-timeout>30</session-timeout> node setting to the <session-config> node.At the command prompt, execute the following command:
grep session-timeout /etc/vco/app-server/web.xml
If the value of <session-timeout> is not "30" or is missing, this is a finding.SRG-APP-000295-WSR-000134<GroupDescription></GroupDescription>VRAU-TC-000705tc Server VCAC must set an inactive timeout for sessions.<VulnDiscussion>Leaving sessions open indefinitely is a major security risk. An attacker can easily use an already authenticated session to access the hosted application as the previously authenticated user. By closing sessions after a set period of inactivity, the web server can make certain that those sessions that are not closed through the user logging out of an application are eventually closed.
tc Server provides a session timeout parameter in the web.xml configuration file.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100763V-90113CCI-002361Navigate to and open /etc/vcac/web.xml.
Navigate to the <session-config> node.
Add the <session-timeout>30</session-timeout> node setting to the <session-config> node.At the command prompt, execute the following command:
grep session-timeout /etc/vcac/web.xml
If the value of <session-timeout> is not "30" or is missing, this is a finding.SRG-APP-000315-WSR-000003<GroupDescription></GroupDescription>VRAU-TC-000710tc Server ALL must be configured to the correct user authentication source.<VulnDiscussion>Remote access to the web server is any access that communicates through an external, non-organization-controlled network. Remote access can be used to access hosted applications or to perform management functions.
A web server can be accessed remotely and must be able to enforce remote access policy requirements or work in conjunction with enterprise tools designed to enforce policy requirements.
vRealize Automation can be configured with a variety of authentication sources. Site policies and procedures will dictate the appropriate authentication mechanism.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100765V-90115CCI-002314Obtain the correct configuration data for the Authentication Source from the ISSO.
Open a web browser, and type in the vRA URL.
1. Log on to the Tenant Administration Portal.
2. Click on Administration >> Directories Management.
3. Click on "Policies".
4. Click on the "Policy Set" link.
5. Modify the Authentication Source in accordance with site policy.Obtain the correct configuration data for the Authentication Source from the ISSO.
Open a web browser, and type in the vRA URL.
1. Log on to the Tenant Administration Portal.
2. Click on Administration >> Directories Management.
3. Click on "Policies".
4. Click on the "Policy Set" link.
5. Verify that User Authentication is configured correctly.
If the Authentication Source is not configured in accordance with site policy, this is a finding.SRG-APP-000315-WSR-000004<GroupDescription></GroupDescription>VRAU-TC-000715tc Server HORIZON must be configured to use the https scheme.<VulnDiscussion>Remote access to the web server is any access that communicates through an external, non-organization-controlled network. Remote access can be used to access hosted applications or to perform management functions.
tc Server connections are managed by the Connector object class. By configuring external Connector objects to use the HTTPS scheme, vRA's information in flight will be protected.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100767V-90117CCI-002314Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to each of the <Connector> nodes.
Configure each <Connector> node with the value 'scheme="https"'.Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to each of the <Connector> nodes.
If the value of "scheme" is not set to "https" or is missing, this is a finding.SRG-APP-000315-WSR-000004<GroupDescription></GroupDescription>VRAU-TC-000720tc Server VCAC must be configured to use the https scheme.<VulnDiscussion>Remote access to the web server is any access that communicates through an external, non-organization-controlled network. Remote access can be used to access hosted applications or to perform management functions.
tc Server connections are managed by the Connector object class. By configuring external Connector objects to use the HTTPS scheme, vRA's information in flight will be protected.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100769V-90119CCI-002314Navigate to and open /etc/vcac/server.xml.
Navigate to the <Connector> node.
Configure the <Connector> node with the value 'scheme="https"'.Navigate to and open /etc/vcac/server.xml.
Navigate to the <Connector> node.
If the value of "scheme" is not set to "https" or is missing, this is a finding.SRG-APP-000357-WSR-000150<GroupDescription></GroupDescription>VRAU-TC-000740tc Server ALL must use a logging mechanism that is configured to allocate log record storage capacity large enough to accommodate the logging requirements of the web server.<VulnDiscussion>In order to make certain that the logging mechanism used by the web server has sufficient storage capacity in which to write the logs, the logging mechanism needs to be able to allocate log record storage capacity.
The task of allocating log record storage capacity is usually performed during initial installation of the logging mechanism. The system administrator will usually coordinate the allocation of physical drive space with the web server administrator along with the physical location of the partition and disk. Refer to NIST SP 800-92 for specific requirements on log rotation and storage dependent on the impact of the web server.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100771V-90121CCI-001849Configure the web server to use a logging mechanism that is configured to allocate log record storage capacity in accordance with NIST SP 800-92 log record storage requirements.Interview the ISSO.
Determine if tc Server ALL is using a logging mechanism that is configured to have a capacity large enough to accommodate logging requirements.
If the logging mechanism does not have sufficient capacity, this is a finding.SRG-APP-000358-WSR-000163<GroupDescription></GroupDescription>VRAU-TC-000750tc Server ALL log files must be moved to a permanent repository in accordance with site policy.<VulnDiscussion>A web server will typically utilize logging mechanisms for maintaining a historical log of activity that occurs within a hosted application. This information can then be used for diagnostic purposes, forensics purposes, or other purposes relevant to ensuring the availability and integrity of the hosted application.
Log files must be periodically moved from the web server to a permanent storage location. This serves two beneficial purposes. First, the web server's resources are freed up for productions. Also, this ensures that the site has, and enforces, policies designed to preserve the integrity of historical logs.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100999V-90349CCI-001851Develop and enforce a site procedure for moving log files periodically from the web server to a permanent repository in accordance with site retention policies.Interview the ISSO.
Review the site policy for moving log files from the web server to a permanent repository. Ensure that log files are being moved from the web server in accordance with the site policy.
If the site does not have a policy for periodically moving log files to an archive repository or such policy is not being enforced, this is a finding.SRG-APP-000359-WSR-000065<GroupDescription></GroupDescription>VRAU-TC-000755tc Server ALL must use a logging mechanism that is configured to provide a warning to the ISSO and SA when allocated record storage volume reaches 75% of maximum log record storage capacity.<VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process logs as required. Log processing failures include: software/hardware errors, failures in the log capturing mechanisms, and log storage capacity being reached or exceeded.
If log capacity were to be exceeded, then events subsequently occurring would not be recorded. Organizations must define a maximum allowable percentage of storage capacity serving as an alarming threshold (e.g., web server has exceeded 75% of log storage capacity allocated), at which time the web server or the logging mechanism the web server utilizes will provide a warning to the ISSO and SA at a minimum.
This requirement can be met by configuring the web server to utilize a dedicated log tool that meets this requirement.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100773V-90123CCI-001855Configure the tc Server ALL logging mechanism to alert the ISSO / SA when the logs have reached 75% of storage capacity.Interview the ISSO.
Review site documentation and system configuration. Determine if the system has a logging mechanism that will provide a warning to the ISSO and SA when allocated record storage volume reaches 75% of maximum log record storage capacity.
If such an alert mechanism is not in use, this is a finding.SRG-APP-000374-WSR-000172<GroupDescription></GroupDescription>VRAU-TC-000760tc Server HORIZON must generate log records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).<VulnDiscussion>If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analysis across multiple devices and log records.
Time stamps generated by the web server include date and time. Time is commonly expressed in Coordinated Universal Time (UTC), a modern continuation of Greenwich Mean Time (GMT), or local time with an offset from UTC.
Like all web servers, tc Server logs can be configured to produce a Common Log Format (CLF). The tc Server component known as an AccessLogValve, which represents a component that can be inserted into the request processing pipeline to capture user interaction. The Access Log Valve creates log files in the same format as those created by standard web servers including GMT offset.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100775V-90125CCI-001890Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to the <Valve className="org.apache.catalina.valves.AccessLogValve"> node.
Set the "pattern" setting with "%h %l %u %t "%r" %s %b".
Note: The <Valve> node should be configured per the following:
<Valve className="org.apache.catalina.valves.AccessLogValve"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="localhost_access_log."
suffix=".txt"/>At the command prompt, execute the following command:
tail /storage/log/vmware/horizon/localhost_access_log.YYYY-MM-dd.txt
If the timestamp does not contain a time zone mapping, this is a finding.
Note: Substitute the actual date in the file name.
Note: In Common Log Format, a timestamp will look like [06/Feb/2016:23:12:57 +0000]. The +0000 part is the time zone mapping.SRG-APP-000374-WSR-000172<GroupDescription></GroupDescription>VRAU-TC-000765tc Server VCO must generate log records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).<VulnDiscussion>If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analysis across multiple devices and log records.
Time stamps generated by the web server include date and time. Time is commonly expressed in Coordinated Universal Time (UTC), a modern continuation of Greenwich Mean Time (GMT), or local time with an offset from UTC.
Like all web servers, tc Server logs can be configured to produce a Common Log Format (CLF). The tc Server component known as an AccessLogValve, which represents a component that can be inserted into the request processing pipeline to capture user interaction. The Access Log Valve creates log files in the same format as those created by standard web servers including GMT offset.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100777V-90127CCI-001890Navigate to and open /etc/vco/app-server/server.xml.
Navigate to the <Valve className="org.apache.catalina.valves.AccessLogValve"> node.
Set the "pattern" setting with "%h %l %u %t "%r" %s %b".
Note: The <Valve> node should be configured per the following:
<Valve className="org.apache.catalina.valves.AccessLogValve"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="localhost_access_log."
suffix=".txt"/>At the command prompt, execute the following command:
tail /storage/log/vmware/vco/app-server/localhost_access_log.txt
If the timestamp does not contain a time zone mapping, this is a finding.
Note: In Common Log Format, a timestamp will look like [06/Feb/2016:23:12:57 +0000]. The +0000 part is the time zone mapping.SRG-APP-000374-WSR-000172<GroupDescription></GroupDescription>VRAU-TC-000770tc Server VCAC must generate log records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).<VulnDiscussion>If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analysis across multiple devices and log records.
Time stamps generated by the web server include date and time. Time is commonly expressed in Coordinated Universal Time (UTC), a modern continuation of Greenwich Mean Time (GMT), or local time with an offset from UTC.
Like all web servers, tc Server logs can be configured to produce a Common Log Format (CLF). The tc Server component known as an AccessLogValve, which represents a component that can be inserted into the request processing pipeline to capture user interaction. The Access Log Valve creates log files in the same format as those created by standard web servers including GMT offset.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100779V-90129CCI-001890Navigate to and open /etc/vcac/server.xml.
Navigate to the <Valve className="org.apache.catalina.valves.AccessLogValve"> node.
Set the "pattern" setting with "%h %l %u %t "%r" %s %b".
Note: The <Valve> node should be configured per the following:
<Valve className="org.apache.catalina.valves.AccessLogValve"
checkExists="true"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="access_log"
requestAttributesEnabled="true"
rotatable="false"
suffix=".txt"/>At the command prompt, execute the following command:
tail /storage/log/vmware/vcac/access_log.YYYY-MM-dd.txt
If the timestamp does not contain a time zone mapping, this is a finding.
Note: Substitute the actual date in the file name.
Note: In Common Log Format, a timestamp will look like [06/Feb/2016:23:12:57 +0000]. The +0000 part is the time zone mapping.SRG-APP-000375-WSR-000171<GroupDescription></GroupDescription>VRAU-TC-000775tc Server HORIZON must record time stamps for log records to a minimum granularity of one second.<VulnDiscussion>Without sufficient granularity of time stamps, it is not possible to adequately determine the chronological order of records.
Time stamps generated by the web server include date and time and must be to a granularity of one second.
Like all web servers, tc Server logs can be configured to produce a Common Log Format (CLF). The tc Server component known as an AccessLogValve, which represents a component that can be inserted into the request processing pipeline to capture user interaction. The Access Log Valve should be configured to ensure that investigators have sufficient information to conduct an appropriate audit.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100781V-90131CCI-001889Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to the <Valve className="org.apache.catalina.valves.AccessLogValve"> node.
Set the 'pattern' setting with "%h %l %u %t "%r" %s %b".
Note: The <Valve> node should be configured per the following:
<Valve className="org.apache.catalina.valves.AccessLogValve"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="localhost_access_log."
suffix=".txt"/>At the command prompt, execute the following command:
tail /storage/log/vmware/horizon/localhost_access_log.YYYY-MM-dd.txt
If the timestamp does not contain a minimum granularity of one second, this is a finding.
Note: Substitute the actual date in the file name.
Note: In Common Log Format, a timestamp will look like [06/Feb/2016:23:12:57 +0000]. The "57" part is the "seconds" part of the timestamp.SRG-APP-000375-WSR-000171<GroupDescription></GroupDescription>VRAU-TC-000780tc Server VCO must record time stamps for log records to a minimum granularity of one second.<VulnDiscussion>Without sufficient granularity of time stamps, it is not possible to adequately determine the chronological order of records.
Time stamps generated by the web server include date and time and must be to a granularity of one second.
Like all web servers, tc Server logs can be configured to produce a Common Log Format (CLF). The tc Server component known as an AccessLogValve, which represents a component that can be inserted into the request processing pipeline to capture user interaction. The Access Log Valve should be configured to ensure that investigators have sufficient information to conduct an appropriate audit.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100783V-90133CCI-001889Navigate to and open /etc/vco/app-server/server.xml.
Navigate to the <Valve className="org.apache.catalina.valves.AccessLogValve"> node.
Set the "pattern" setting with "%h %l %u %t "%r" %s %b".
Note: The <Valve> node should be configured per the following:
<Valve className="org.apache.catalina.valves.AccessLogValve"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="localhost_access_log."
suffix=".txt"/>At the command prompt, execute the following command:
tail /storage/log/vmware/vco/app-server/localhost_access_log.txt
If the timestamp does not contain a minimum granularity of one second, this is a finding.
Note: In Common Log Format, a timestamp will look like [06/Feb/2016:23:12:57 +0000]. The "57" part is the "seconds" part of the timestamp.SRG-APP-000375-WSR-000171<GroupDescription></GroupDescription>VRAU-TC-000785tc Server VCAC must record time stamps for log records to a minimum granularity of one second.<VulnDiscussion>Without sufficient granularity of time stamps, it is not possible to adequately determine the chronological order of records.
Time stamps generated by the web server include date and time and must be to a granularity of one second.
Like all web servers, tc Server logs can be configured to produce a Common Log Format (CLF). The tc Server component known as an AccessLogValve, which represents a component that can be inserted into the request processing pipeline to capture user interaction. The Access Log Valve should be configured to ensure that investigators have sufficient information to conduct an appropriate audit.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100785V-90135CCI-001889Navigate to and open /etc/vcac/server.xml.
Navigate to the <Valve className="org.apache.catalina.valves.AccessLogValve"> node.
Set the "pattern" setting with "%h %l %u %t "%r" %s %b".
Note: The <Valve> node should be configured per the following:
<Valve className="org.apache.catalina.valves.AccessLogValve"
checkExists="true"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="access_log"
requestAttributesEnabled="true"
rotatable="false"
suffix=".txt"/>At the command prompt, execute the following command:
tail /storage/log/vmware/vcac/access_log.YYYY-MM-dd.txt
If the timestamp does not contain a minimum granularity of one second, this is a finding.
Note: Substitute the actual date in the file name.
Note: In Common Log Format, a timestamp will look like [06/Feb/2016:23:12:57 +0000]. The "57" part is the "seconds" part of the timestamp.SRG-APP-000380-WSR-000072<GroupDescription></GroupDescription>VRAU-TC-000790tc Server HORIZON application, libraries, and configuration files must only be accessible to privileged users.<VulnDiscussion>A web server can be modified through parameter modification, patch installation, upgrades to the web server or modules, and security parameter changes. With each of these changes, there is the potential for an adverse effect such as a DoS, web server instability, or hosted application instability.
To limit changes to the web server and limit exposure to any adverse effects from the changes, files such as the web server application files, libraries, and configuration files must have permissions and ownership set properly to only allow privileged users access.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100787V-90137CCI-001813Remove all world permissions from any listed file with the following command:
chmod -R o-rwx /opt/vmware/horizon/workspace /opt/vmware/horizon/workspace/webappsAt the command prompt, execute the following command:
ls -alR /opt/vmware/horizon/workspace /opt/vmware/horizon/workspace/webapps | grep -E '^-' | awk '$1 !~ /---$/ {print}'
If the command produces any output, this is a finding.SRG-APP-000380-WSR-000072<GroupDescription></GroupDescription>VRAU-TC-000795tc Server VCO application, libraries, and configuration files must only be accessible to privileged users.<VulnDiscussion>A web server can be modified through parameter modification, patch installation, upgrades to the web server or modules, and security parameter changes. With each of these changes, there is the potential for an adverse effect such as a DoS, web server instability, or hosted application instability.
To limit changes to the web server and limit exposure to any adverse effects from the changes, files such as the web server application files, libraries, and configuration files must have permissions and ownership set properly to only allow privileged users access.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100789V-90139CCI-001813Remove all world permissions from any listed file with the following command:
chmod -R o-rwx /usr/lib/vco/configuration/webappsAt the command prompt, execute the following command:
ls -alR /usr/lib/vco/configuration/webapps | grep -E '^-' | awk '$1 !~ /---$/ {print}'
If the command produces any output, this is a finding.SRG-APP-000380-WSR-000072<GroupDescription></GroupDescription>VRAU-TC-000800tc Server VCAC application, libraries, and configuration files must only be accessible to privileged users.<VulnDiscussion>A web server can be modified through parameter modification, patch installation, upgrades to the web server or modules, and security parameter changes. With each of these changes, there is the potential for an adverse effect such as a DoS, web server instability, or hosted application instability.
To limit changes to the web server and limit exposure to any adverse effects from the changes, files such as the web server application files, libraries, and configuration files must have permissions and ownership set properly to only allow privileged users access.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100791V-90141CCI-001813Remove all world permissions from any listed file with the following command:
chmod -R o-rwx /etc/vcac /usr/lib/vcac/server/webappsAt the command prompt, execute the following commands:
ls -alR /etc/vcac /usr/lib/vcac/server/webapps | grep -E '^-' | awk '$1 !~ /---$/ {print}'
If the command produces any output, this is a finding.SRG-APP-000383-WSR-000175<GroupDescription></GroupDescription>VRAU-TC-000805tc Server HORIZON must be configured with the appropriate ports.<VulnDiscussion>Web servers provide numerous processes, features, and functionalities that utilize TCP/IP ports. Some of these processes may be deemed unnecessary or too unsecure to run on a production system.
The web server must provide the capability to disable or deactivate network-related services that are deemed to be non-essential to the server mission, are too unsecure, or are prohibited by the PPSM CAL and vulnerability assessments.
An essential configuration file for tc Server is catalina.properties. The ports that tc Server listens to will be configured in that file.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100793V-90143CCI-001762Navigate to and open /opt/vmware/horizon/workspace/conf/catalina.properties.
Navigate to the ports specification section.
Set the tc Server HORIZON port specifications according to the list below:
base.shutdown.port=-1
base.jmx.port=6969
bio-ssl.https.port=6443At the command prompt, execute the following command:
cat /opt/vmware/horizon/workspace/conf/catalina.properties | grep -E '\.port'
Review the listed ports. Verify that they match the list below of tc Server HORIZON ports.
base.shutdown.port=-1
base.jmx.port=6969
bio-ssl.https.port=6443
If the displayed ports do not match the above list of ports, this is a finding.SRG-APP-000383-WSR-000175<GroupDescription></GroupDescription>VRAU-TC-000810tc Server VCO must be configured with the appropriate ports.<VulnDiscussion>Web servers provide numerous processes, features, and functionalities that utilize TCP/IP ports. Some of these processes may be deemed unnecessary or too unsecure to run on a production system.
The web server must provide the capability to disable or deactivate network-related services that are deemed to be non-essential to the server mission, are too unsecure, or are prohibited by the PPSM CAL and vulnerability assessments.
An essential configuration file for tc Server is catalina.properties. The ports that tc Server listens to will be configured in that file.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100795V-90145CCI-001762Navigate to and open /etc/vco/app-server/catalina.properties.
Navigate to the ports specification section.
Set the tc Server VCO port specifications according to the list below:
ch.dunes.http-server.port=8280
ch.dunes.https-server.port=8281At the command prompt, execute the following command:
cat /etc/vco/app-server/catalina.properties | grep -E '\.port'
Review the listed ports. Verify that they match the list below of tc Server VCO ports.
ch.dunes.http-server.port=8280
ch.dunes.https-server.port=8281
If the displayed ports do not match the above list of ports, this is a finding.SRG-APP-000383-WSR-000175<GroupDescription></GroupDescription>VRAU-TC-000815tc Server VCAC must be configured with the appropriate ports.<VulnDiscussion>Web servers provide numerous processes, features, and functionalities that utilize TCP/IP ports. Some of these processes may be deemed unnecessary or too unsecure to run on a production system.
The web server must provide the capability to disable or deactivate network-related services that are deemed to be non-essential to the server mission, are too unsecure, or are prohibited by the PPSM CAL and vulnerability assessments.
An essential configuration file for tc Server is catalina.properties. The ports that tc Server listens to will be configured in that file.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100797V-90147CCI-001762Navigate to and open /etc/vcac/catalina.properties.
Navigate to the ports specification section.
Set the tc Server VCAC port specifications according to the list below:
base.shutdown.port=-1
base.jmx.port=6969
ajp.http.port=8009
ajp.https.port=8443At the command prompt, execute the following command:
cat /etc/vcac/catalina.properties | grep -E '\.port'
Review the listed ports. Verify that they match the list below of tc Server VCAC ports.
base.shutdown.port=-1
base.jmx.port=6969
ajp.http.port=8009
ajp.https.port=8443
If the displayed ports do not match the above list of ports, this is a finding.SRG-APP-000416-WSR-000118<GroupDescription></GroupDescription>VRAU-TC-000820tc Server HORIZON must use NSA Suite A cryptography when encrypting data that must be compartmentalized.<VulnDiscussion>Cryptography is only as strong as the encryption modules/algorithms employed to encrypt the data.
Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data.
NSA has developed Type 1 algorithms for protecting classified information. The Committee on National Security Systems (CNSS) National Information Assurance Glossary (CNSS Instruction No. 4009) defines Type 1 products as:
"Cryptographic equipment, assembly or component classified or certified by NSA for encrypting and decrypting classified and sensitive national security information when appropriately keyed. Developed using established NSA business processes and containing NSA-approved algorithms are used to protect systems requiring the most stringent protection mechanisms."
Although persons may have a security clearance, they may not have a "need-to-know" and are required to be separated from the information in question. The web server must employ NSA-approved cryptography to protect classified information from those individuals who have no "need-to-know" or when encryption of compartmentalized data is required by data classification.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100799V-90149CCI-002450Navigate to and open /opt/vmware/horizon/workspace/conf/catalina.properties.
Navigate to the "bio-ssl.cipher.list" setting.
Configure "bio-ssl.cipher.list" with a list of NSA Suite A ciphers.If the system is not implemented to process compartmentalized information, this requirement is Not Applicable.
At the command prompt, execute the following command:
grep bio-ssl.cipher.list /opt/vmware/horizon/workspace/conf/catalina.properties
If the value of "bio-ssl.cipher.list" does not match the list of NSA Suite A ciphers or is missing, this is a finding.SRG-APP-000416-WSR-000118<GroupDescription></GroupDescription>VRAU-TC-000825tc Server VCAC must use NSA Suite A cryptography when encrypting data that must be compartmentalized.<VulnDiscussion>Cryptography is only as strong as the encryption modules/algorithms employed to encrypt the data.
Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data.
NSA has developed Type 1 algorithms for protecting classified information. The Committee on National Security Systems (CNSS) National Information Assurance Glossary (CNSS Instruction No. 4009) defines Type 1 products as:
"Cryptographic equipment, assembly or component classified or certified by NSA for encrypting and decrypting classified and sensitive national security information when appropriately keyed. Developed using established NSA business processes and containing NSA-approved algorithms are used to protect systems requiring the most stringent protection mechanisms."
Although persons may have a security clearance, they may not have a "need-to-know" and are required to be separated from the information in question. The web server must employ NSA-approved cryptography to protect classified information from those individuals who have no "need-to-know" or when encryption of compartmentalized data is required by data classification.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100801V-90151CCI-002450Navigate to and open /etc/vcac/catalina.properties.
Navigate to and locate "cipher".
Configure the "cipher" with NSA Suite A ciphers.If the system is not implemented to process compartmentalized information, this requirement is Not Applicable.
At the command prompt, execute the following command:
grep cipher /etc/vcac/catalina.properties
If the value of "cipher" does not match the list of NSA Suite A ciphers or is missing, this is a finding.SRG-APP-000435-WSR-000147<GroupDescription></GroupDescription>VRAU-TC-000840tc Server HORIZON must disable the shutdown port.<VulnDiscussion>An attacker has at least two reasons to stop a web server. The first is to cause a DoS, and the second is to put in place changes the attacker made to the web server configuration.
As a Tomcat derivative, tc Server uses a port (defaults to 8005) as a shutdown port. If enabled, a shutdown signal can be sent to tc Server through this port. To ensure availability, the shutdown port should be disabled.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100803V-90153CCI-002385Navigate to and open /opt/vmware/horizon/workspace/conf/catalina.properties.
Navigate to the "base.shutdown.port" setting.
Add the setting "base.shutdown.port=-1" to the "catalina.properties" file.At the command prompt, execute the following command:
grep base.shutdown.port /opt/vmware/horizon/workspace/conf/catalina.properties
If the value of "base.shutdown.port" is not set to "-1" or is missing, this is a finding.SRG-APP-000435-WSR-000147<GroupDescription></GroupDescription>VRAU-TC-000845tc Server VCO must disable the shutdown port.<VulnDiscussion>An attacker has at least two reasons to stop a web server. The first is to cause a DoS, and the second is to put in place changes the attacker made to the web server configuration.
As a Tomcat derivative, tc Server uses a port (defaults to 8005) as a shutdown port. If enabled, a shutdown signal can be sent to tc Server through this port. To ensure availability, the shutdown port should be disabled.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100805V-90155CCI-002385Navigate to and open /etc/vco/app-server/server.xml.
Navigate to the <Server> node.
Add the attribute 'port="-1"' to the <Server> node in the "server.xml" file.At the command prompt, execute the following command:
grep shutdown /etc/vco/app-server/server.xml
If the value of "shutdown" is not set to "-1" or is missing, this is a finding.SRG-APP-000435-WSR-000147<GroupDescription></GroupDescription>VRAU-TC-000850tc Server VCAC must disable the shutdown port.<VulnDiscussion>An attacker has at least two reasons to stop a web server. The first is to cause a DoS, and the second is to put in place changes the attacker made to the web server configuration.
As a Tomcat derivative, tc Server uses a port (defaults to 8005) as a shutdown port. If enabled, a shutdown signal can be sent to tc Server through this port. To ensure availability, the shutdown port should be disabled.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100807V-90157CCI-002385Navigate to and open /etc/vcac/catalina.properties.
Navigate to the "base.shutdown.port" setting.
Add the setting "base.shutdown.port=-1" to the "catalina.properties" file.At the command prompt, execute the following command:
grep base.shutdown.port /etc/vcac/catalina.properties
If the value of "base.shutdown.port" is not set to "-1" or is missing, this is a finding.SRG-APP-000439-WSR-000151<GroupDescription></GroupDescription>VRAU-TC-000860tc Server HORIZON must employ cryptographic mechanisms (TLS/DTLS/SSL) preventing the unauthorized disclosure of information during transmission.<VulnDiscussion>Preventing the disclosure of transmitted information requires that the web server take measures to employ some form of cryptographic mechanism in order to protect the information during transmission. This is usually achieved through the use of Transport Layer Security (TLS).
Transmission of data can take place between the web server and a large number of devices/applications external to the web server. Examples are a web client used by a user, a backend database, an audit server, or other web servers in a web cluster.
tc Server connections are managed by the Connector object class. The Connector object can be configured to use a range of transport encryption methods. Many older transport encryption methods have been proven to be weak. vRA should be configured to use modern, secure forms of transport encryption.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100809V-90159CCI-002418Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to each of the <Connector> nodes.
Note: There are three <Connector> nodes.
Configure each <Connector> nodes with the setting 'sslProtocol="TLS"'.Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml
Navigate to each of the <Connector> nodes.
If the value of "sslProtocol" is not set to "TLS" or is missing, this is a finding.SRG-APP-000439-WSR-000151<GroupDescription></GroupDescription>VRAU-TC-000865tc Server VCAC must employ cryptographic mechanisms (TLS/DTLS/SSL) preventing the unauthorized disclosure of information during transmission.<VulnDiscussion>Preventing the disclosure of transmitted information requires that the web server take measures to employ some form of cryptographic mechanism in order to protect the information during transmission. This is usually achieved through the use of Transport Layer Security (TLS).
Transmission of data can take place between the web server and a large number of devices/applications external to the web server. Examples are a web client used by a user, a backend database, an audit server, or other web servers in a web cluster.
tc Server connections are managed by the Connector object class. The Connector object can be configured to use a range of transport encryption methods. Many older transport encryption methods have been proven to be weak. vRA should be configured to use modern, secure forms of transport encryption.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100811V-90161CCI-002418Navigate to and open /etc/vcac/server.xml.
Navigate to the <Connector> node.
Configure the <Connector> node with the setting 'sslProtocol="TLS"'.Navigate to and open /etc/vcac/server.xml.
Navigate to the <Connector> node.
If the value of "sslProtocol" is not set to "TLS" or is missing, this is a finding.SRG-APP-000439-WSR-000152<GroupDescription></GroupDescription>VRAU-TC-000870tc Server HORIZON session IDs must be sent to the client using SSL/TLS.<VulnDiscussion>The HTTP protocol is a stateless protocol. To maintain a session, a session identifier is used. The session identifier is a piece of data that is used to identify a session and a user. If the session identifier is compromised by an attacker, the session can be hijacked. By encrypting the session identifier, the identifier becomes more difficult for an attacker to hijack, decrypt, and use before the session has expired.
tc Server connections are managed by the Connector object class. The Connector object can be configured to use a range of transport encryption methods. Many older transport encryption methods have been proven to be weak. vRA should be configured to use modern, secure forms of transport encryption.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100813V-90163CCI-002418Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to each of the <Connector> nodes.
Note: There are three <Connector> nodes.
Configure each <Connector> nodes with the setting 'sslProtocol="TLS"'.Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to each of the <Connector> nodes.
If the value of "sslProtocol" is not set to "TLS" or is missing, this is a finding.SRG-APP-000439-WSR-000152<GroupDescription></GroupDescription>VRAU-TC-000875tc Server VCAC session IDs must be sent to the client using SSL/TLS.<VulnDiscussion>The HTTP protocol is a stateless protocol. To maintain a session, a session identifier is used. The session identifier is a piece of data that is used to identify a session and a user. If the session identifier is compromised by an attacker, the session can be hijacked. By encrypting the session identifier, the identifier becomes more difficult for an attacker to hijack, decrypt, and use before the session has expired.
tc Server connections are managed by the Connector object class. The Connector object can be configured to use a range of transport encryption methods. Many older transport encryption methods have been proven to be weak. vRA should be configured to use modern, secure forms of transport encryption.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100815V-90165CCI-002418Navigate to and open /etc/vcac/server.xml.
Navigate to the <Connector> node.
Configure the <Connector> node with the setting 'sslProtocol="TLS"'.Navigate to and open /etc/vcac/server.xml.
Navigate to the <Connector> node.
If the value of "sslProtocol" is not set to "TLS" or is missing, this is a finding.SRG-APP-000439-WSR-000154<GroupDescription></GroupDescription>VRAU-TC-000885tc Server HORIZON must set the useHttpOnly parameter.<VulnDiscussion>A cookie can be read by client-side scripts easily if cookie properties are not set properly. By allowing cookies to be read by the client-side scripts, information such as session identifiers could be compromised and used by an attacker who intercepts the cookie. Setting cookie properties (i.e. HttpOnly property) to disallow client-side scripts from reading cookies better protects the information inside the cookie.
As a Tomcat derivative, tc Server contains a Context object, which represents a web application running within a particular virtual host. One of the configurable parameters of the Context object will prevent the tc Server cookies from being accessed by JavaScript from another site.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100817V-90167CCI-002418Navigate to and open /opt/vmware/horizon/workspace/conf/context.xml.
Navigate to the <Context> node.
Add the 'useHttpOnly="true"' setting to the <Context> node.
Note: The <Context> node should be configured per the following:
<Context useHttpOnly="true">At the command prompt, execute the following command:
grep useHttpOnly /opt/vmware/horizon/workspace/conf/context.xml
If the value of "useHttpOnly" is not set to "true" or is missing, this is a finding.SRG-APP-000439-WSR-000154<GroupDescription></GroupDescription>VRAU-TC-000890tc Server VCO must set the useHttpOnly parameter.<VulnDiscussion>A cookie can be read by client-side scripts easily if cookie properties are not set properly. By allowing cookies to be read by the client-side scripts, information such as session identifiers could be compromised and used by an attacker who intercepts the cookie. Setting cookie properties (i.e. HttpOnly property) to disallow client-side scripts from reading cookies better protects the information inside the cookie.
As a Tomcat derivative, tc Server contains a Context object, which represents a web application running within a particular virtual host. One of the configurable parameters of the Context object will prevent the tc Server cookies from being accessed by JavaScript from another site.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100819V-90169CCI-002418Navigate to and open /etc/vco/app-server/context.xml.
Navigate to the <Context> node.
Add the 'useHttpOnly="true"' setting to the <Context> node.
Note: The <Context> node should be configured per the following:
<Context useHttpOnly="true">At the command prompt, execute the following command:
grep useHttpOnly /etc/vco/app-server/context.xml
If the value of "useHttpOnly" is not set to "true" or is missing, this is a finding.SRG-APP-000439-WSR-000154<GroupDescription></GroupDescription>VRAU-TC-000895tc Server VCAC must set the useHttpOnly parameter.<VulnDiscussion>A cookie can be read by client-side scripts easily if cookie properties are not set properly. By allowing cookies to be read by the client-side scripts, information such as session identifiers could be compromised and used by an attacker who intercepts the cookie. Setting cookie properties (i.e. HttpOnly property) to disallow client-side scripts from reading cookies better protects the information inside the cookie.
As a Tomcat derivative, tc Server contains a Context object, which represents a web application running within a particular virtual host. One of the configurable parameters of the Context object will prevent the tc Server cookies from being accessed by JavaScript from another site.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100821V-90171CCI-002418Navigate to and open /etc/vcac/context.xml.
Navigate to the <Context> node.
Add the 'useHttpOnly="true"' setting to the <Context> node.
Note: The <Context> node should be configured per the following:
<Context useHttpOnly="true">At the command prompt, execute the following command:
grep useHttpOnly /etc/vcac/context.xml
If the value of "useHttpOnly" is not set to "true" or is missing, this is a finding.SRG-APP-000439-WSR-000155<GroupDescription></GroupDescription>VRAU-TC-000900tc Server HORIZON must set the secure flag for cookies.<VulnDiscussion>Cookies can be sent to a client using TLS/SSL to encrypt the cookies, but TLS/SSL is not used by every hosted application since the data being displayed does not require the encryption of the transmission. To safeguard against cookies, especially session cookies, being sent in plaintext, a cookie can be encrypted before transmission. To force a cookie to be encrypted before transmission, the cookie Secure property can be set.
As a Tomcat derivative, tc Server is based in part on the Java Servlet specification. Servlet 3.0 (Java EE 6) introduced a standard way to configure secure attribute for the session cookie, this can be done by applying the correct configuration in web.xml.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100823V-90173CCI-002418Navigate to and open /opt/vmware/horizon/workspace/conf/web.xml.
Navigate to the <session-config> node.
Add the <cookie-config> --> <secure> node setting to the <session-config> node.
Note: The <cookie-config> --> <secure> node should be configured per the following:
<cookie-config>
<secure>true</secure>
</cookie-config>At the command prompt, execute the following command:
grep -E '<secure>' /opt/vmware/horizon/workspace/conf/web.xml
If the value of the <secure> node is not set to "true" or is missing, this is a finding.SRG-APP-000439-WSR-000155<GroupDescription></GroupDescription>VRAU-TC-000905tc Server VCO must set the secure flag for cookies.<VulnDiscussion>Cookies can be sent to a client using TLS/SSL to encrypt the cookies, but TLS/SSL is not used by every hosted application since the data being displayed does not require the encryption of the transmission. To safeguard against cookies, especially session cookies, being sent in plaintext, a cookie can be encrypted before transmission. To force a cookie to be encrypted before transmission, the cookie Secure property can be set.
As a Tomcat derivative, tc Server is based in part on the Java Servlet specification. Servlet 3.0 (Java EE 6) introduced a standard way to configure secure attribute for the session cookie, this can be done by applying the correct configuration in web.xml.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100825V-90175CCI-002418Navigate to and open /etc/vco/app-server/web.xml.
Navigate to the <session-config> node.
Add the <cookie-config> --> <secure> node setting to the <session-config> node.
Note: The <cookie-config> --> <secure> node should be configured per the following:
<cookie-config>
<secure>true</secure>
</cookie-config>At the command prompt, execute the following command:
grep -E '<secure>' /etc/vco/app-server/web.xml
If the value of the <secure> node is not set to "true" or is missing, this is a finding.SRG-APP-000439-WSR-000155<GroupDescription></GroupDescription>VRAU-TC-000910tc Server VCAC must set the secure flag for cookies.<VulnDiscussion>Cookies can be sent to a client using TLS/SSL to encrypt the cookies, but TLS/SSL is not used by every hosted application since the data being displayed does not require the encryption of the transmission. To safeguard against cookies, especially session cookies, being sent in plaintext, a cookie can be encrypted before transmission. To force a cookie to be encrypted before transmission, the cookie Secure property can be set.
As a Tomcat derivative, tc Server is based in part on the Java Servlet specification. Servlet 3.0 (Java EE 6) introduced a standard way to configure secure attribute for the session cookie, this can be done by applying the correct configuration in web.xml.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100827V-90177CCI-002418Navigate to and open /etc/vcac/web.xml.
Navigate to the <session-config> node.
Add the <cookie-config> --> <secure> node setting to the <session-config> node.
Note: The <cookie-config> --> <secure> node should be configured per the following:
<cookie-config>
<secure>true</secure>
</cookie-config>At the command prompt, execute the following command:
grep -E '<secure>' /etc/vcac/web.xml
If the value of the <secure> node is not set to "true" or is missing, this is a finding.SRG-APP-000439-WSR-000156<GroupDescription></GroupDescription>VRAU-TC-000915tc Server HORIZON must set sslEnabledProtocols to an approved Transport Layer Security (TLS) version.<VulnDiscussion>Transport Layer Security (TLS) is a required transmission protocol for a web server hosting controlled information. The use of TLS provides confidentiality of data in transit between the web server and client. FIPS 140-2 approved TLS versions must be enabled and non-FIPS-approved SSL versions must be disabled.
NIST SP 800-52 defines the approved TLS versions for government applications.
tc Server connections are managed by the Connector object class. The Connector object can be configured to use a range of transport encryption methods. Many older transport encryption methods have been proven to be weak. vRA should be configured to use the sslEnabledProtocols correctly to ensure that older, less secure forms of transport security are not used.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100829V-90179CCI-002418Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to each of the <Connector> nodes.
Note: There are three <Connector> nodes.
Configure each <Connector> node with the setting 'sslEnabledProtocols="TLSv1.2,TLSv1.1,TLSv1"'.Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to each of the <Connector> nodes.
If the value of "sslEnabledProtocols" is not set to "TLSv1.2,TLSv1.1,TLSv1" or is missing, this is a finding.SRG-APP-000439-WSR-000156<GroupDescription></GroupDescription>VRAU-TC-000920tc Server VCAC must set sslEnabledProtocols to an approved Transport Layer Security (TLS) version.<VulnDiscussion>Transport Layer Security (TLS) is a required transmission protocol for a web server hosting controlled information. The use of TLS provides confidentiality of data in transit between the web server and client. FIPS 140-2 approved TLS versions must be enabled and non-FIPS-approved SSL versions must be disabled.
NIST SP 800-52 defines the approved TLS versions for government applications.
tc Server connections are managed by the Connector object class. The Connector object can be configured to use a range of transport encryption methods. Many older transport encryption methods have been proven to be weak. vRA should be configured to use the sslEnabledProtocols correctly to ensure that older, less secure forms of transport security are not used.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100831V-90181CCI-002418Navigate to and open /etc/vcac/server.xml.
Navigate to the <Connector> node.
Configure the <Connector> node with the setting 'sslEnabledProtocols="TLSv1.2,TLSv1.1,TLSv1"'.Navigate to and open /etc/vcac/server.xml.
Navigate to the <Connector> node.
If the value of "sslEnabledProtocols" is not set to "TLSv1.2,TLSv1.1,TLSv1" or is missing, this is a finding.SRG-APP-000439-WSR-000188<GroupDescription></GroupDescription>VRAU-TC-000925tc Server HORIZON must remove all export ciphers to protect the confidentiality and integrity of transmitted information.<VulnDiscussion>During the initial setup of a Transport Layer Security (TLS) connection to the web server, the client sends a list of supported cipher suites in order of preference. The web server will reply with the cipher suite it will use for communication from the client list. If an attacker can intercept the submission of cipher suites to the web server and place, as the preferred cipher suite, a weak export suite, the encryption used for the session becomes easy for the attacker to break, often within minutes to hours.
An essential configuration file for tc Server is catalina.properties. Properly configured, tc Server will not provide the weaker, export ciphers.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100833V-90183CCI-002418Navigate to and open /opt/vmware/horizon/workspace/conf/catalina.properties.
Navigate to the "bio-ssl.cipher.list" setting.
Remove any export ciphers from "bio-ssl.cipher.list".
Note: To view a list of export ciphers, at the command prompt execute the following command:
openssl ciphers 'EXP'At the command prompt, execute the following command:
grep bio-ssl.cipher.list /opt/vmware/horizon/workspace/conf/catalina.properties
If any export ciphers are listed, this is a finding.SRG-APP-000439-WSR-000188<GroupDescription></GroupDescription>VRAU-TC-000930tc Server VCAC must remove all export ciphers to protect the confidentiality and integrity of transmitted information.<VulnDiscussion>During the initial setup of a Transport Layer Security (TLS) connection to the web server, the client sends a list of supported cipher suites in order of preference. The web server will reply with the cipher suite it will use for communication from the client list. If an attacker can intercept the submission of cipher suites to the web server and place, as the preferred cipher suite, a weak export suite, the encryption used for the session becomes easy for the attacker to break, often within minutes to hours.
An essential configuration file for tc Server is catalina.properties. Properly configured, tc Server will not provide the weaker, export ciphers.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100835V-90185CCI-002418Navigate to and open /etc/vcac/catalina.properties.
Navigate to the "cipher" setting.
Remove any export ciphers from "cipher".
Note: To view a list of export ciphers, at the command prompt execute the following command:
openssl ciphers 'EXP'At the command prompt, execute the following command:
grep ciphers /etc/vcac/catalina.properties
If any export ciphers are listed, this is a finding.SRG-APP-000442-WSR-000182<GroupDescription></GroupDescription>VRAU-TC-000940tc Server HORIZON must use approved Transport Layer Security (TLS) versions to maintain the confidentiality and integrity of information during reception.<VulnDiscussion>Information can be either unintentionally or maliciously disclosed or modified during reception, including, for example, during aggregation, at protocol transformation points, and during packing/unpacking. These unauthorized disclosures or modifications compromise the confidentiality or integrity of the information.
Protecting the confidentiality and integrity of received information requires that application servers take measures to employ approved cryptography in order to protect the information during transmission over the network. This is usually achieved through the use of Transport Layer Security (TLS), SSL VPN, or IPsec tunnel.
tc Server connections are managed by the Connector object class. The Connector object can be configured to use a range of transport encryption methods. Many older transport encryption methods have been proven to be weak. vRA should be configured to use the sslEnabledProtocols correctly to ensure that older, less secure forms of transport security are not used.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100837V-90187CCI-002422Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to each of the <Connector> nodes.
Note: There are three <Connector> nodes.
Configure each <Connector> node with the setting 'sslEnabledProtocols="TLSv1.2,TLSv1.1,TLSv1"'.Navigate to and open /opt/vmware/horizon/workspace/conf/server.xml.
Navigate to each of the <Connector> nodes.
If the value of "sslEnabledProtocols" is not set to "TLSv1.2,TLSv1.1,TLSv1" or is missing, this is a finding.SRG-APP-000442-WSR-000182<GroupDescription></GroupDescription>VRAU-TC-000945tc Server VCAC must use approved Transport Layer Security (TLS) versions to maintain the confidentiality and integrity of information during reception.<VulnDiscussion>Information can be either unintentionally or maliciously disclosed or modified during reception, including, for example, during aggregation, at protocol transformation points, and during packing/unpacking. These unauthorized disclosures or modifications compromise the confidentiality or integrity of the information.
Protecting the confidentiality and integrity of received information requires that application servers take measures to employ approved cryptography in order to protect the information during transmission over the network. This is usually achieved through the use of Transport Layer Security (TLS), SSL VPN, or IPsec tunnel.
tc Server connections are managed by the Connector object class. The Connector object can be configured to use a range of transport encryption methods. Many older transport encryption methods have been proven to be weak. vRA should be configured to use the sslEnabledProtocols correctly to ensure that older, less secure forms of transport security are not used.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100839V-90189CCI-002422Navigate to and open /etc/vcac/server.xml.
Navigate to the <Connector> node.
Configure the <Connector> node with the setting 'sslEnabledProtocols="TLSv1.2,TLSv1.1,TLSv1"'.Navigate to and open /etc/vcac/server.xml.
Navigate to the <Connector> node.
If the value of "sslEnabledProtocols" is not set to "TLSv1.2,TLSv1.1,TLSv1" or is missing, this is a finding.SRG-APP-000456-WSR-000187<GroupDescription></GroupDescription>VRAU-TC-000950tc Server ALL must have all security-relevant software updates installed within the configured time period directed by an authoritative source.<VulnDiscussion>Security flaws with software applications are discovered daily. Vendors are constantly updating and patching their products to address newly discovered security vulnerabilities. Organizations (including any contractor to the organization) are required to promptly install security-relevant software updates (e.g., patches, service packs, and hot fixes). Flaws discovered during security assessments, continuous monitoring, incident response activities, or information system error handling must also be addressed expeditiously.
The web server will be configured to check for and install security-relevant software updates from an authoritative source within an identified time period from the availability of the update. By default, this time period will be every 24 hours.
VMware delivers product updates and patches regularly. It is crucial that system administrators coordinate installation of product updates with the site ISSO to ensure that updated and patched files are uploaded onto the system as soon as prescribed.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100841V-90191CCI-002605Ensure that patches and updates from an authoritative source are applied at least within 24 hours after they have been received.Interview the ISSO.
Review the policies and procedures used to ensure that all security-related upgrades are being installed within the configured time period directed by an authoritative source.
If all security-related upgrades are not being installed within the configured time period directed by an authoritative source, this is a finding.SRG-APP-000516-WSR-000174<GroupDescription></GroupDescription>VRAU-TC-000960tc Server ALL must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.<VulnDiscussion>Configuring the web server to implement organization-wide security implementation guides and security checklists guarantees compliance with federal standards and establishes a common security baseline across the DoD that reflects the most restrictive security posture consistent with operational requirements.
Configuration settings are the set of parameters that can be changed that affect the security posture and/or functionality of the system. Security-related parameters are those parameters impacting the security state of the web server, including the parameters required to satisfy other security control requirements.
VMware delivers product updates and patches regularly. It is crucial that system administrators coordinate installation of product updates with the site ISSO to ensure that updated and patched files are uploaded onto the system as soon as prescribed.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target VMware vRealize Automation 7-x tc ServerDISADPMS TargetVMware vRealize Automation 7-x tc Server5348SV-100843V-90193CCI-000366Obtain the most current tc Server ALL STIG. Verify that tc Server ALL is configured with all current requirements.Interview the ISSO.
Verify that this Security Technical Implementation Guide (STIG) is the most current STIG available for tc Server on vRA. Assess all of the organization's vRA installations to ensure that they are fully compliant with the most current tc Server STIG.
If the most current version of the tc Server was not used, or if the tc Server configuration is not compliant with the most current tc Server STIG, this is a finding.