VMware vSphere 7.0 VAMI Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000516-WSR-000174
Group -
SRG-APP-000266-WSR-000159
Group -
VAMI must be configured to hide the server type and version in client responses.
Web servers will often display error messages to client users, displaying enough information to aid in the debugging of the error. The information given back in error messages may display the web s...Rule Medium Severity -
SRG-APP-000179-WSR-000111
Group -
VAMI must enable FIPS mode.
Encryption is only as good as the encryption modules used. Unapproved cryptographic module algorithms cannot be verified and cannot be relied on to provide confidentiality or integrity, and DOD dat...Rule High Severity -
VAMI must limit the number of simultaneous requests.
Denial of service (DoS) is one threat against web servers. Many DoS attacks attempt to consume web server resources in such a way that no more resources are available to satisfy legitimate requests...Rule Medium Severity -
VAMI must generate log records for system startup and shutdown.
Logging must be started as soon as possible when a service starts and when a service is stopped. Many forms of suspicious actions can be detected by analyzing logs for unexpected service starts and...Rule Medium Severity -
VAMI must produce log records containing sufficient information to establish what type of events occurred.
After a security incident has occurred, investigators will often review log files to determine what happened. Understanding what type of event occurred is critical for investigation of a suspicious...Rule Medium Severity -
The rsyslog must be configured to monitor VAMI logs.
For performance reasons, rsyslog file monitoring is preferred over configuring VAMI to send events to a syslog facility. Without ensuring that logs are created, rsyslog configs are created, and tho...Rule Medium Severity -
VAMI must have Multipurpose Internet Mail Extensions (MIME) that invoke operating system shell programs disabled.
Controlling what a user of a hosted application can access is part of the security posture of the web server. Any time a user can access more functionality than is needed for the operation of the h...Rule Medium Severity -
VAMI must remove all mappings to unused scripts.
Scripts allow server-side processing on behalf of the hosted application user or as processes needed in the implementation of hosted applications. Removing scripts not needed for application operat...Rule Medium Severity -
VAMI must prevent hosted applications from exhausting system resources.
Most of the attention to denial-of-service (DoS) attacks focuses on ensuring that systems and applications are not victims of these attacks. However, these systems and applications must also be sec...Rule Medium Severity -
VAMI must protect against or limit the effects of HTTP types of denial-of-service (DoS) attacks.
In UNIX and related computer operating systems, a file descriptor is an indicator used to access a file or other input/output resource, such as a pipe or network connection. File descriptors index ...Rule Medium Severity -
VAMI must not be configured to use "mod_status".
Any application providing too much information in error logs and in administrative messages to the screen risks compromising the data and security of the application and system. VAMI must only gen...Rule Medium Severity -
VAMI must be protected from being stopped by a nonprivileged user.
An attacker has at least two reasons to stop a web server. The first is to cause a denial of service, and the second is to put in place changes the attacker made to the web server configuration. Th...Rule Medium Severity -
VAMI must disable client-initiated Transport Layer Security (TLS) renegotiation.
All versions of the Secure Sockets Layer (SSL) and TLS protocols (up to and including TLS 1.2) are vulnerable to a man-in-the-middle attack (CVE-2009-3555) during a renegotiation. This vulnerabilit...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.