Skip to content

VMware vSphere 7.0 VAMI Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • VAMI log files must only be accessible by privileged users.

    Log data is essential in the investigation of events. If log data were to become compromised, competent forensic analysis and discovery of the true source of potentially malicious system activity w...
    Rule Medium Severity
  • SRG-APP-000125-WSR-000071

    Group
  • SRG-APP-000131-WSR-000051

    Group
  • VAMI server binaries and libraries must be verified for their integrity.

    Being able to verify that a patch, upgrade, certificate, etc., being added to the web server is unchanged from the producer of the file is essential for file validation and nonrepudiation of the in...
    Rule Medium Severity
  • SRG-APP-000141-WSR-000075

    Group
  • VAMI must only load allowed server modules.

    A web server can provide many features, services, and processes. Some of these may be deemed unnecessary or too unsecure to run on a production DOD system. VAMI can be configured to load any numb...
    Rule Medium Severity
  • SRG-APP-000141-WSR-000081

    Group
  • SRG-APP-000141-WSR-000081

    Group
  • VAMI must explicitly disable Multipurpose Internet Mail Extensions (MIME) mime mappings based on "Content-Type".

    Controlling what a user of a hosted application can access is part of the security posture of the web server. Any time a user can access more functionality than is needed for the operation of the h...
    Rule Medium Severity
  • SRG-APP-000141-WSR-000082

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules