VMware vSphere 8.0 vCenter Appliance Envoy Security Technical Implementation Guide

Overview

VersionDateFinding Count (5)Downloads
22024-07-11CAT I (High): 0CAT II (Medium): 5CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - MAC II - Mission Support Public

Finding IDSeverityTitleDescription
V-259161
LOWMEDIUMHIGH
The vCenter Envoy and Rhttpproxy service log files permissions must be set correctly.Log data is essential in the investigation of events. If log data were to become compromised, then competent forensic analysis and discovery of the tr...
V-259162
LOWMEDIUMHIGH
The vCenter Envoy service private key file must be protected from unauthorized access.Envoy's private key is used to prove the identity of the server to clients and securely exchange the shared secret key used to encrypt communications ...
V-259163
LOWMEDIUMHIGH
The vCenter Rhttpproxy service log files must be sent to a central log server.Writing events to a centralized management audit system offers many benefits to the enterprise over having dispersed logs. Centralized management of a...
V-259164
LOWMEDIUMHIGH
The vCenter Envoy service log files must be sent to a central log server.Writing events to a centralized management audit system offers many benefits to the enterprise over having dispersed logs. Centralized management of a...
V-259165
LOWMEDIUMHIGH
The vCenter Envoy service must set a limit on remote connections.Envoy client connections must be limited to preserve system resources and continue servicing connections without interruption. Without a limit set, th...