VMware vSphere 7.0 vCenter Appliance STS Security Technical Implementation Guide

Overview

VersionDateFinding Count (31)Downloads
12023-06-15CAT I (High): 0CAT II (Medium): 31CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - MAC I - Mission Critical Public

Finding IDSeverityTitleDescription
V-256745
LOWMEDIUMHIGH
The Security Token Service must limit the amount of time that each Transmission Control Protocol (TCP) connection is kept alive.Denial of service (DoS) is one threat against web servers. Many DoS attacks attempt to consume web server resources in such a way that no more resourc...
V-256746
LOWMEDIUMHIGH
The Security Token Service must limit the number of concurrent connections permitted.Resource exhaustion can occur when an unlimited number of concurrent requests are allowed on a website, facilitating a denial-of-service attack. Unles...
V-256747
LOWMEDIUMHIGH
The Security Token Service must limit the maximum size of a POST request.The "maxPostSize" value is the maximum size in bytes of the POST that will be handled by the container FORM URL parameter parsing. Limit its size to r...
V-256748
LOWMEDIUMHIGH
The Security Token Service must protect cookies from cross-site scripting (XSS).Cookies are a common way to save session state over the HTTP(S) protocol. If an attacker can compromise session data stored in a cookie, they are bett...
V-256749
LOWMEDIUMHIGH
The Security Token Service must record user access in a format that enables monitoring of remote access.Remote access can be exploited by an attacker to compromise the server. By recording all remote access activities, it will be possible to determine th...
V-256750
LOWMEDIUMHIGH
The Security Token Service must generate log records during Java startup and shutdown.Logging must be started as soon as possible when a service starts and as late as possible when a service is stopped. Many forms of suspicious actions ...
V-256751
LOWMEDIUMHIGH
Security Token Service log files must only be modifiable by privileged users.Log data is essential in the investigation of events. The accuracy of the information is always pertinent. One of the first steps an attacker will und...
V-256752
LOWMEDIUMHIGH
The Security Token Service application files must be verified for their integrity.Verifying the Security Token Service application code is unchanged from its shipping state is essential for file validation and nonrepudiation of the ...
V-256753
LOWMEDIUMHIGH
The Security Token Service must only run one webapp.VMware ships the Security Token Service on the vCenter Server Appliance (VCSA) with one webapp, in "ROOT.war". Any other ".war" file is potentially ma...
V-256754
LOWMEDIUMHIGH
The Security Token Service must not be configured with unused realms.The Security Token Service performs user authentication at the application level and not through Tomcat. To eliminate unnecessary features and ensure ...
V-256755
LOWMEDIUMHIGH
The Security Token Service must be configured to limit access to internal packages.The "package.access" entry in the "catalina.properties" file implements access control at the package level. When properly configured, a Security Exce...
V-256756
LOWMEDIUMHIGH
The Security Token Service must have Multipurpose Internet Mail Extensions (MIME) that invoke operating system shell programs disabled.MIME mappings tell the Security Token Service what type of program various file types and extensions are and what external utilities or programs are n...
V-256757
LOWMEDIUMHIGH
The Security Token Service must have mappings set for Java servlet pages.Resource mapping is the process of tying a particular file type to a process in the web server that can serve that type of file to a requesting client...
V-256758
LOWMEDIUMHIGH
The Security Token Service must not have the Web Distributed Authoring (WebDAV) servlet installed.WebDAV is an extension to the HTTP protocol that, when developed, was meant to allow users to create, change, and move documents on a server, typicall...
V-256759
LOWMEDIUMHIGH
The Security Token Service must be configured with memory leak protection.The Java Runtime environment can cause a memory leak or lock files under certain conditions. Without memory leak protection, the Security Token Servic...
V-256760
LOWMEDIUMHIGH
The Security Token Service must not have any symbolic links in the web content directory tree.A web server is designed to deliver content and execute scripts or applications on the request of a client or user. Containing user requests to files ...
V-256761
LOWMEDIUMHIGH
The Security Token Service directory tree must have permissions in an out-of-the-box state.As a rule, accounts on a web server are to be kept to a minimum. Only administrators, web managers, developers, auditors, and web authors require acco...
V-256762
LOWMEDIUMHIGH
The Security Token Service must fail to a known safe state if system initialization fails, shutdown fails, or aborts fail.Determining a safe state for failure and weighing that against a potential denial of service for users depends on what type of application the web ser...
V-256763
LOWMEDIUMHIGH
The Security Token Service must limit the number of allowed connections.Limiting the number of established connections to the Security Token Service is a basic denial-of-service protection. Servers where the limit is too h...
V-256764
LOWMEDIUMHIGH
The Security Token Service must set "URIEncoding" to UTF-8.Invalid user input occurs when a user inserts data or characters into a hosted application's data entry field and the hosted application is unprepared...
V-256765
LOWMEDIUMHIGH
The Security Token Service must use the "setCharacterEncodingFilter" filter.Invalid user input occurs when a user inserts data or characters into a hosted application's data entry field and the hosted application is unprepared...
V-256766
LOWMEDIUMHIGH
The Security Token Service must set the welcome-file node to a default web page.Enumeration techniques, such as Uniform Resource Locator (URL) parameter manipulation, rely on being able to obtain information about the web server's...
V-256767
LOWMEDIUMHIGH
The Security Token Service must not show directory listings.Enumeration techniques, such as Uniform Resource Locator (URL) parameter manipulation, rely on being able to obtain information about the web server's...
V-256768
LOWMEDIUMHIGH
The Security Token Service must be configured to not show error reports.Web servers will often display error messages to client users, displaying enough information to aid in the debugging of the error. The information giv...
V-256769
LOWMEDIUMHIGH
The Security Token Service must not enable support for TRACE requests."TRACE" is a technique for a user to request internal information about Tomcat. This is useful during product development but should not be enabled in...
V-256770
LOWMEDIUMHIGH
The Security Token Service must have the debug option disabled.Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information about the web server and plug...
V-256771
LOWMEDIUMHIGH
The Security Token Service must be configured with the appropriate ports.Web servers provide numerous processes, features, and functionalities that use TCP/IP ports. Some of these processes may be deemed unnecessary or too ...
V-256772
LOWMEDIUMHIGH
The Security Token Service must disable the shutdown port.An attacker has at least two reasons to stop a web server. The first is to cause a denial of service, and the second is to put in place changes the at...
V-256773
LOWMEDIUMHIGH
The Security Token Service must set the secure flag for cookies.The secure flag is an option that can be set by the application server when sending a new cookie to the user within an HTTP Response. The purpose of t...
V-256774
LOWMEDIUMHIGH
The Security Token Service default servlet must be set to "readonly".The default servlet (or DefaultServlet) is a special servlet provided with Tomcat that is called when no other suitable page is found in a particular ...
V-256775
LOWMEDIUMHIGH
Security Token Service log data and records must be backed up onto a different system or media.Protection of Security Token Service log data includes ensuring log data is not accidentally lost or deleted. Backing up Security Token Service log re...