VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 Security Technical Implementation Guide

Overview

VersionDateFinding Count (104)Downloads
12023-10-29CAT I (High): 13CAT II (Medium): 88CAT III (Low): 3
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - MAC I - Mission Critical Classified

Finding IDSeverityTitleDescription
V-258801
LOWMEDIUMHIGH
The Photon operating system must audit all account creations.Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomp...
V-258802
LOWMEDIUMHIGH
The Photon operating system must enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period.By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force att...
V-258803
LOWMEDIUMHIGH
The Photon operating system must display the Standard Mandatory DOD Notice and Consent Banner before granting local or remote access to the system.Display of a standardized and approved use notification before granting access to the operating system ensures privacy and security notification verbi...
V-258805
LOWMEDIUMHIGH
The Photon operating system must monitor remote access logins.Remote access services, such as those providing remote access to network devices and information systems, which lack automated monitoring capabilities...
V-258807
LOWMEDIUMHIGH
The Photon operating system must configure auditd to log to disk.Without establishing what type of events occurred, it would be difficult to establish, correlate, and investigate the events leading up to an outage o...
V-258808
LOWMEDIUMHIGH
The Photon operating system must enable the auditd service.Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or...
V-258809
LOWMEDIUMHIGH
The Photon operating system must be configured to audit the execution of privileged functions.Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external entities that have compromise...
V-258810
LOWMEDIUMHIGH
The Photon operating system must alert the ISSO and SA in the event of an audit processing failure.It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without this notificatio...
V-258811
LOWMEDIUMHIGH
The Photon operating system must protect audit logs from unauthorized access.Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confidentiality. Audit informat...
V-258812
LOWMEDIUMHIGH
The Photon operating system must allow only authorized users to configure the auditd service.Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel may be able to prevent the ...
V-258813
LOWMEDIUMHIGH
The Photon operating system must generate audit records when successful/unsuccessful attempts to access privileges occur.The changing of file permissions could indicate that a user is attempting to gain access to information that would otherwise be disallowed. Auditing D...
V-258814
LOWMEDIUMHIGH
The Photon operating system must enforce password complexity by requiring that at least one uppercase character be used.Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure...
V-258815
LOWMEDIUMHIGH
The Photon operating system must enforce password complexity by requiring that at least one lowercase character be used.Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure...
V-258816
LOWMEDIUMHIGH
The Photon operating system must enforce password complexity by requiring that at least one numeric character be used.Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure...
V-258817
LOWMEDIUMHIGH
The Photon operating system must require the change of at least eight characters when passwords are changed.If the operating system allows the user to consecutively reuse extensive portions of passwords, this increases the chances of password compromise by i...
V-258820
LOWMEDIUMHIGH
The Photon operating system must enforce one day as the minimum password lifetime.Enforcing a minimum password lifetime helps to prevent repeated password changes to defeat the password reuse or history enforcement requirement. If u...
V-258821
LOWMEDIUMHIGH
The Photon operating systems must enforce a 90-day maximum password lifetime restriction.Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the operating system does not...
V-258822
LOWMEDIUMHIGH
The Photon operating system must prohibit password reuse for a minimum of five generations.Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. If the in...
V-258823
LOWMEDIUMHIGH
The Photon operating system must enforce a minimum 15-character password length.The shorter the password, the lower the number of possible combinations that need to be tested before the password is compromised. Password complexit...
V-258824
LOWMEDIUMHIGH
The Photon operating system must require authentication upon booting into single-user and maintenance modes.If the system does not require authentication before it boots into single-user mode, anyone with console access to the system can trivially access all...
V-258825
LOWMEDIUMHIGH
The Photon operating system must disable unnecessary kernel modules.It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessa...
V-258826
LOWMEDIUMHIGH
The Photon operating system must not have duplicate User IDs (UIDs).To ensure accountability and prevent unauthenticated access, organizational users must be uniquely identified and authenticated to prevent potential m...
V-258827
LOWMEDIUMHIGH
The Photon operating system must use mechanisms meeting the requirements of applicable federal laws, Executive orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be relied upon to provide con...
V-258828
LOWMEDIUMHIGH
The Photon operating system must restrict access to the kernel message buffer.Restricting access to the kernel message buffer limits access only to root. This prevents attackers from gaining additional system information as a no...
V-258829
LOWMEDIUMHIGH
The Photon operating system must be configured to use TCP syncookies.A TCP SYN flood attack can cause a Denial of Service (DOS) by filling a system's TCP connection table with connections in the SYN_RCVD state. Syncooki...
V-258830
LOWMEDIUMHIGH
The Photon operating system must terminate idle Secure Shell (SSH) sessions after 15 minutes.Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management se...
V-258831
LOWMEDIUMHIGH
The Photon operating system /var/log directory must be restricted.Any operating system providing too much information in error messages risks compromising the data and security of the structure, and content of error ...
V-258832
LOWMEDIUMHIGH
The Photon operating system must reveal error messages only to authorized users.Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational st...
V-258833
LOWMEDIUMHIGH
The Photon operating system must audit all account modifications.Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomp...
V-258834
LOWMEDIUMHIGH
The Photon operating system must audit all account removal actions.When operating system accounts are removed, user accessibility is affected. Accounts are utilized for identifying individual users or for identifying ...
V-258836
LOWMEDIUMHIGH
The Photon operating system must initiate session audits at system startup.If auditing is enabled late in the startup process, the actions of some startup processes may not be audited. Some audit systems also maintain state i...
V-258837
LOWMEDIUMHIGH
The Photon operating system must protect audit tools from unauthorized access.Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tool...
V-258838
LOWMEDIUMHIGH
The Photon operating system must enforce password complexity by requiring that at least one special character be used.Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity or strength is a measure o...
V-258840
LOWMEDIUMHIGH
The operating system must automatically terminate a user session after inactivity time-outs have expired.Automatic session termination addresses the termination of user-initiated logical sessions in contrast to the termination of network connections that ...
V-258842
LOWMEDIUMHIGH
The Photon operating system must audit the execution of privileged functions.Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external entities that have compromise...
V-258843
LOWMEDIUMHIGH
The Photon operating system must automatically lock an account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes occur.By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, ...
V-258847
LOWMEDIUMHIGH
The Photon operating system must require users to reauthenticate for privilege escalation.Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When operating systems provide the c...
V-258848
LOWMEDIUMHIGH
The Photon operating system must implement address space layout randomization to protect its memory from unauthorized code execution.Some adversaries launch attacks with the intent of executing code in nonexecutable regions of memory or in memory locations that are prohibited. Secur...
V-258849
LOWMEDIUMHIGH
The Photon operating system must remove all software components after updated versions have been installed.Previous versions of software components that are not removed from the information system after updates have been installed may be exploited by advers...
V-258850
LOWMEDIUMHIGH
The Photon operating system must generate audit records when successful/unsuccessful logon attempts occur.Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlat...
V-258851
LOWMEDIUMHIGH
The Photon operating system must be configured to audit the loading and unloading of dynamic kernel modules.Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlat...
V-258853
LOWMEDIUMHIGH
The Photon operating system must prevent the use of dictionary words for passwords.If the operating system allows the user to select passwords based on dictionary words, then this increases the chances of password compromise by incre...
V-258854
LOWMEDIUMHIGH
The Photon operating system must enforce a delay of at least four seconds between logon prompts following a failed logon attempt in login.defs.Limiting the number of logon attempts over a certain time interval reduces the chances that an unauthorized user may gain access to an account....
V-258855
LOWMEDIUMHIGH
The Photon operating system must ensure audit events are flushed to disk at proper intervals.Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or...
V-258856
LOWMEDIUMHIGH
The Photon operating system must define default permissions for all authenticated users in such a way that the user can only read and modify their own files.Setting the most restrictive default permissions ensures that when new accounts are created they do not have unnecessary access....
V-258858
LOWMEDIUMHIGH
The Photon operating system must be configured to use the pam_faillock.so module.By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force att...
V-258859
LOWMEDIUMHIGH
The Photon operating system must prevent leaking information of the existence of a user account.By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force att...
V-258860
LOWMEDIUMHIGH
The Photon operating system must audit logon attempts for unknown users.By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force att...
V-258861
LOWMEDIUMHIGH
The Photon operating system must include root when automatically locking an account until the locked account is released by an administrator when three unsuccessful logon attempts occur during a 15-minute time period.By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force att...
V-258862
LOWMEDIUMHIGH
The Photon operating system must persist lockouts between system reboots.By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force att...
V-258863
LOWMEDIUMHIGH
The Photon operating system must be configured to use the pam_pwquality.so module.Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure...
V-258865
LOWMEDIUMHIGH
The Photon operating system must configure the Secure Shell (SSH) SyslogFacility.Automated monitoring of remote access sessions allows organizations to detect cyberattacks and ensure ongoing compliance with remote access policies b...
V-258866
LOWMEDIUMHIGH
The Photon operating system must enable Secure Shell (SSH) authentication logging.Automated monitoring of remote access sessions allows organizations to detect cyberattacks and ensure ongoing compliance with remote access policies b...
V-258867
LOWMEDIUMHIGH
The Photon operating system must terminate idle Secure Shell (SSH) sessions.Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management se...
V-258868
LOWMEDIUMHIGH
The Photon operating system must audit all account modifications.Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomp...
V-258869
LOWMEDIUMHIGH
The Photon operating system must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.Limiting the number of logon attempts over a certain time interval reduces the chances that an unauthorized user may gain access to an account....
V-258872
LOWMEDIUMHIGH
The Photon operating system must create a home directory for all new local interactive user accounts.If local interactive users are not assigned a valid home directory, there is no place for the storage and control of files they should own....
V-258873
LOWMEDIUMHIGH
The Photon operating system must disable the debug-shell service.The debug-shell service is intended to diagnose systemd related boot issues with various systemctl commands. Once enabled and following a system reboo...
V-258874
LOWMEDIUMHIGH
The Photon operating system must configure Secure Shell (SSH) to disallow Generic Security Service Application Program Interface (GSSAPI) authentication.GSSAPI authentication is used to provide additional authentication mechanisms to applications. Allowing GSSAPI authentication through Secure Shell (SS...
V-258875
LOWMEDIUMHIGH
The Photon operating system must configure Secure Shell (SSH) to disable X11 forwarding.X11 is an older, insecure graphics forwarding protocol. It is not used by Photon and should be disabled as a general best practice to limit attack sur...
V-258876
LOWMEDIUMHIGH
The Photon operating system must configure Secure Shell (SSH) to perform strict mode checking of home directory configuration files.If other users have access to modify user-specific SSH configuration files, they may be able to log on to the system as another user....
V-258877
LOWMEDIUMHIGH
The Photon operating system must configure Secure Shell (SSH) to disallow Kerberos authentication.If Kerberos is enabled through SSH, sshd provides a means of access to the system's Kerberos implementation. Vulnerabilities in the system's Kerberos ...
V-258878
LOWMEDIUMHIGH
The Photon operating system must configure Secure Shell (SSH) to disallow compression of the encrypted session stream.If compression is allowed in an SSH connection prior to authentication, vulnerabilities in the compression software could result in compromise of the ...
V-258879
LOWMEDIUMHIGH
The Photon operating system must configure Secure Shell (SSH) to display the last login immediately after authentication.Providing users with feedback on the last time they logged on via SSH facilitates user recognition and reporting of unauthorized account use....
V-258880
LOWMEDIUMHIGH
The Photon operating system must configure Secure Shell (SSH) to ignore user-specific trusted hosts lists.SSH trust relationships enable trivial lateral spread after a host compromise and therefore must be explicitly disabled. Individual users can have a l...
V-258881
LOWMEDIUMHIGH
The Photon operating system must configure Secure Shell (SSH) to ignore user-specific known_host files.SSH trust relationships enable trivial lateral spread after a host compromise and therefore must be explicitly disabled. Individual users can have a l...
V-258882
LOWMEDIUMHIGH
The Photon operating system must configure Secure Shell (SSH) to limit the number of allowed login attempts per connection.By setting the login attempt limit to a low value, an attacker will be forced to reconnect frequently, which severely limits the speed and effectivene...
V-258883
LOWMEDIUMHIGH
The Photon operating system must configure Secure Shell (SSH) to restrict AllowTcpForwarding.While enabling TCP tunnels is a valuable function of sshd, this feature is not appropriate for use on single purpose appliances....
V-258884
LOWMEDIUMHIGH
The Photon operating system must configure Secure Shell (SSH) to restrict LoginGraceTime.By default, SSH unauthenticated connections are left open for two minutes before being closed. This setting is too permissive as no legitimate login w...
V-258885
LOWMEDIUMHIGH
The Photon operating system must be configured so that the x86 Ctrl-Alt-Delete key sequence is disabled on the command line.When the Ctrl-Alt-Del target is enabled, a locally logged-on user who presses Ctrl-Alt-Delete, when at the console, can reboot the system. If accident...
V-258886
LOWMEDIUMHIGH
The Photon operating system must not forward IPv4 or IPv6 source-routed packets.Source routing is an Internet Protocol mechanism that allows an IP packet to carry information, a list of addresses, that tells a router the path the ...
V-258887
LOWMEDIUMHIGH
The Photon operating system must not respond to IPv4 Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.Responding to broadcast (ICMP) echoes facilitates network mapping and provides a vector for amplification attacks....
V-258888
LOWMEDIUMHIGH
The Photon operating system must prevent IPv4 Internet Control Message Protocol (ICMP) redirect messages from being accepted.ICMP redirect messages are used by routers to inform hosts that a more direct route exists for a particular destination. These messages modify the hos...
V-258889
LOWMEDIUMHIGH
The Photon operating system must prevent IPv4 Internet Control Message Protocol (ICMP) secure redirect messages from being accepted.ICMP redirect messages are used by routers to inform hosts that a more direct route exists for a particular destination. These messages modify the hos...
V-258890
LOWMEDIUMHIGH
The Photon operating system must not send IPv4 Internet Control Message Protocol (ICMP) redirects.ICMP redirect messages are used by routers to inform hosts that a more direct route exists for a particular destination. These messages contain inform...
V-258891
LOWMEDIUMHIGH
The Photon operating system must log IPv4 packets with impossible addresses.The presence of "martian" packets (which have impossible addresses) as well as spoofed packets, source-routed packets, and redirects could be a sign o...
V-258892
LOWMEDIUMHIGH
The Photon operating system must use a reverse-path filter for IPv4 network traffic.Enabling reverse path filtering drops packets with source addresses that should not have been able to be received on the interface they were received ...
V-258893
LOWMEDIUMHIGH
The Photon operating system must not perform IPv4 packet forwarding.Routing protocol daemons are typically used on routers to exchange network topology information with other routers. If this software is used when not ...
V-258894
LOWMEDIUMHIGH
The Photon operating system must send TCP timestamps.TCP timestamps are used to provide protection against wrapped sequence numbers. It is possible to calculate system uptime (and boot time) by analyzing...
V-258895
LOWMEDIUMHIGH
The Photon operating system must be configured to protect the Secure Shell (SSH) public host key from unauthorized modification.If a public host key file is modified by an unauthorized user, the SSH service may be compromised....
V-258896
LOWMEDIUMHIGH
The Photon operating system must be configured to protect the Secure Shell (SSH) private host key from unauthorized access.If an unauthorized user obtains the private SSH host key file, the host could be impersonated....
V-258897
LOWMEDIUMHIGH
The Photon operating system must enforce password complexity on the root account.Password complexity rules must apply to all accounts on the system, including root. Without specifying the enforce_for_root flag, pam_pwquality does n...
V-258898
LOWMEDIUMHIGH
The Photon operating system must disable systemd fallback DNS.Systemd contains an ability to set fallback DNS servers, which is used for DNS lookups in the event no system level DNS servers are configured or othe...
V-258899
LOWMEDIUMHIGH
The Photon operating system must generate audit records for all access and modifications to the opasswd file.Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or...
V-258901
LOWMEDIUMHIGH
The Photon operating system must enable the rsyslog service.Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information sy...
V-258902
LOWMEDIUMHIGH
The Photon operating system must be configured to use the pam_pwhistory.so module.Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. If the in...
V-258903
LOWMEDIUMHIGH
The Photon operating system must enable hardlink access control protection in the kernel.By enabling the fs.protected_hardlinks kernel parameter, users can no longer create soft or hard links to files they do not own. Disallowing such hard...
V-258904
LOWMEDIUMHIGH
The Photon operating system must restrict core dumps.By enabling the fs.suid_dumpable kernel parameter, core dumps are not generated for setuid or otherwise protected/tainted binaries. This prevents user...
V-258804
LOWMEDIUMHIGH
The Photon operating system must limit the number of concurrent sessions to ten for all accounts and/or account types.Operating system management includes the ability to control the number of users and user sessions that utilize an operating system. Limiting the numbe...
V-258844
LOWMEDIUMHIGH
The Photon operating system must allocate audit record storage capacity to store audit records when audit records are not immediately sent to a central audit record storage facility.Audit logs are most useful when accessible by date, rather than size. This can be accomplished through a combination of an audit log rotation and sett...
V-258845
LOWMEDIUMHIGH
The Photon operating system must immediately notify the SA and ISSO when allocated audit record storage volume reaches 75 percent of the repository maximum audit record storage capacity.If security personnel are not notified immediately when storage volume reaches 75 percent utilization, they are unable to plan for audit record storag...
V-258806
LOWMEDIUMHIGH
The Photon operating system must have the OpenSSL FIPS provider installed to protect the confidentiality of remote access sessions.Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session. OpenSSH...
V-258818
LOWMEDIUMHIGH
The operating system must store only encrypted representations of passwords.Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can ...
V-258819
LOWMEDIUMHIGH
The Photon operating system must not have the telnet package installed.Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can ...
V-258835
LOWMEDIUMHIGH
The Photon operating system must implement only approved ciphers to protect the integrity of remote access sessions.Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote access (e.g., RDP) is access ...
V-258839
LOWMEDIUMHIGH
The Photon operating system must use cryptographic mechanisms to protect the integrity of audit tools.Protecting the integrity of the tools used for auditing purposes is a critical step toward ensuring the integrity of audit information. Audit informat...
V-258841
LOWMEDIUMHIGH
The Photon operating system must enable symlink access control protection in the kernel.By enabling the fs.protected_symlinks kernel parameter, symbolic links are permitted to be followed only when outside a sticky world-writable director...
V-258846
LOWMEDIUMHIGH
The Photon operating system TDNF package management tool must cryptographically verify the authenticity of all software packages during installation.Installation of any nontrusted software, patches, service packs, device drivers, or operating system components can significantly affect the overall s...
V-258852
LOWMEDIUMHIGH
The Photon operating system must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The operating system must implement cry...
V-258857
LOWMEDIUMHIGH
The Photon operating system must configure Secure Shell (SSH) to disallow HostbasedAuthentication.SSH trust relationships enable trivial lateral spread after a host compromise and therefore must be explicitly disabled....
V-258864
LOWMEDIUMHIGH
The Photon operating system TDNF package management tool must cryptographically verify the authenticity of all software packages during installation for all repos.Installation of any nontrusted software, patches, service packs, device drivers, or operating system components can significantly affect the overall s...
V-258870
LOWMEDIUMHIGH
The Photon operating system must configure Secure Shell (SSH) to disallow authentication with an empty password.Blank passwords are one of the first things an attacker checks for when probing a system. Even if the user somehow has a blank password on the OS, SSH...
V-258871
LOWMEDIUMHIGH
The Photon operating system must configure Secure Shell (SSH) to disable user environment processing.Enabling user environment processing may enable users to bypass access restrictions in some configurations and must therefore be disabled....
V-258900
LOWMEDIUMHIGH
The Photon operating system must implement only approved Message Authentication Codes (MACs) to protect the integrity of remote access sessions.Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote access (e.g., RDP) is access ...