VMware vSphere 7.0 VAMI Security Technical Implementation Guide

Overview

VersionDateFinding Count (28)Downloads
12023-06-15CAT I (High): 2CAT II (Medium): 26CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - MAC III - Administrative Public

Finding IDSeverityTitleDescription
V-256645
LOWMEDIUMHIGH
VAMI must limit the number of simultaneous requests.Denial of service (DoS) is one threat against web servers. Many DoS attacks attempt to consume web server resources in such a way that no more resourc...
V-256647
LOWMEDIUMHIGH
VAMI must use cryptography to protect the integrity of remote sessions.Data exchanged between the user and the web server can range from static display data to credentials used to log in the hosted application. Even when ...
V-256648
LOWMEDIUMHIGH
VAMI must be configured to monitor remote access.Remote access can be exploited by an attacker to compromise the server. By recording all remote access activities, it will be possible to determine th...
V-256649
LOWMEDIUMHIGH
VAMI must generate log records for system startup and shutdown.Logging must be started as soon as possible when a service starts and when a service is stopped. Many forms of suspicious actions can be detected by a...
V-256650
LOWMEDIUMHIGH
VAMI must produce log records containing sufficient information to establish what type of events occurred.After a security incident has occurred, investigators will often review log files to determine what happened. Understanding what type of event occurre...
V-256651
LOWMEDIUMHIGH
VAMI log files must only be accessible by privileged users.Log data is essential in the investigation of events. If log data were to become compromised, competent forensic analysis and discovery of the true so...
V-256652
LOWMEDIUMHIGH
The rsyslog must be configured to monitor VAMI logs.For performance reasons, rsyslog file monitoring is preferred over configuring VAMI to send events to a syslog facility. Without ensuring that logs ar...
V-256653
LOWMEDIUMHIGH
VAMI server binaries and libraries must be verified for their integrity.Being able to verify that a patch, upgrade, certificate, etc., being added to the web server is unchanged from the producer of the file is essential f...
V-256654
LOWMEDIUMHIGH
VAMI must only load allowed server modules.A web server can provide many features, services, and processes. Some of these may be deemed unnecessary or too unsecure to run on a production DOD sy...
V-256655
LOWMEDIUMHIGH
VAMI must have Multipurpose Internet Mail Extensions (MIME) that invoke operating system shell programs disabled.Controlling what a user of a hosted application can access is part of the security posture of the web server. Any time a user can access more function...
V-256656
LOWMEDIUMHIGH
VAMI must explicitly disable Multipurpose Internet Mail Extensions (MIME) mime mappings based on "Content-Type".Controlling what a user of a hosted application can access is part of the security posture of the web server. Any time a user can access more function...
V-256657
LOWMEDIUMHIGH
VAMI must remove all mappings to unused scripts.Scripts allow server-side processing on behalf of the hosted application user or as processes needed in the implementation of hosted applications. Rem...
V-256658
LOWMEDIUMHIGH
VAMI must have resource mappings set to disable the serving of certain file types.Resource mapping is the process of tying a particular file type to a process in the web server that can serve that type of file to a requesting client...
V-256659
LOWMEDIUMHIGH
VAMI must not have the Web Distributed Authoring (WebDAV) servlet installed.A web server can be installed with functionality that, by its nature, is not secure. WebDAV is an extension to the HTTP protocol that, when developed,...
V-256660
LOWMEDIUMHIGH
VAMI must prevent hosted applications from exhausting system resources.Most of the attention to denial-of-service (DoS) attacks focuses on ensuring that systems and applications are not victims of these attacks. However, ...
V-256661
LOWMEDIUMHIGH
VAMI must protect the keystore from unauthorized access.The web server's private key is used to prove the identity of the server to clients and securely exchange the shared secret key used to encrypt commun...
V-256662
LOWMEDIUMHIGH
VAMI must protect against or limit the effects of HTTP types of denial-of-service (DoS) attacks.In UNIX and related computer operating systems, a file descriptor is an indicator used to access a file or other input/output resource, such as a pipe...
V-256663
LOWMEDIUMHIGH
VAMI must set the encoding for all text Multipurpose Internet Mail Extensions (MIME) types to UTF-8.Invalid user input occurs when a user inserts data or characters into a hosted application's data entry field and the hosted application is unprepared...
V-256664
LOWMEDIUMHIGH
VAMI must disable directory browsing.The goal is to completely control the web user's experience in navigating any portion of the web document root directories. Ensuring all web content d...
V-256665
LOWMEDIUMHIGH
VAMI must not be configured to use "mod_status".Any application providing too much information in error logs and in administrative messages to the screen risks compromising the data and security of ...
V-256666
LOWMEDIUMHIGH
VAMI must have debug logging disabled.Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information about the web server and plug...
V-256667
LOWMEDIUMHIGH
VAMI must be protected from being stopped by a nonprivileged user.An attacker has at least two reasons to stop a web server. The first is to cause a denial of service, and the second is to put in place changes the at...
V-256668
LOWMEDIUMHIGH
VAMI must implement Transport Layer Security (TLS) 1.2 exclusively.TLS is a required transmission protocol for a web server hosting controlled information. The use of TLS provides confidentiality of data in transit be...
V-256669
LOWMEDIUMHIGH
VAMI must force clients to select the most secure cipher.During a Transport Layer Security (TLS) session negotiation, when choosing a cipher during a handshake, normally the client's preference is used. Thi...
V-256670
LOWMEDIUMHIGH
VAMI must disable client-initiated Transport Layer Security (TLS) renegotiation.All versions of the Secure Sockets Layer (SSL) and TLS protocols (up to and including TLS 1.2) are vulnerable to a man-in-the-middle attack (CVE-2009-...
V-256671
LOWMEDIUMHIGH
VAMI must be configured to hide the server type and version in client responses.Web servers will often display error messages to client users, displaying enough information to aid in the debugging of the error. The information giv...
V-256646
LOWMEDIUMHIGH
VAMI must be configured with FIPS 140-2 compliant ciphers for HTTPS connections.Encryption of data in flight is an essential element of protecting information confidentiality. If a web server uses weak or outdated encryption algor...
V-256672
LOWMEDIUMHIGH
VAMI must enable FIPS mode.Encryption is only as good as the encryption modules used. Unapproved cryptographic module algorithms cannot be verified and cannot be relied on to pr...