VMware vSphere 8.0 vCenter Appliance Envoy Security Technical Implementation Guide
Overview
| Version | Date | Finding Count (5) | Downloads | ||
| 2 | 2024-07-11 | CAT I (High): 0 | CAT II (Medium): 5 | CAT III (Low): 0 | |
| STIG Description |
| This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil. |
Findings - MAC I - Mission Critical Public
| Finding ID | Severity | Title | Description |
|---|---|---|---|
| V-259161 | The vCenter Envoy and Rhttpproxy service log files permissions must be set correctly. | Log data is essential in the investigation of events. If log data were to become compromised, then competent forensic analysis and discovery of the tr... | |
| V-259162 | The vCenter Envoy service private key file must be protected from unauthorized access. | Envoy's private key is used to prove the identity of the server to clients and securely exchange the shared secret key used to encrypt communications ... | |
| V-259163 | The vCenter Rhttpproxy service log files must be sent to a central log server. | Writing events to a centralized management audit system offers many benefits to the enterprise over having dispersed logs. Centralized management of a... | |
| V-259164 | The vCenter Envoy service log files must be sent to a central log server. | Writing events to a centralized management audit system offers many benefits to the enterprise over having dispersed logs. Centralized management of a... | |
| V-259165 | The vCenter Envoy service must set a limit on remote connections. | Envoy client connections must be limited to preserve system resources and continue servicing connections without interruption. Without a limit set, th... |