Skip to content

VMware vSphere 7.0 VAMI Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000001-WSR-000001

    Group
  • SRG-APP-000014-WSR-000006

    Group
  • VAMI must be configured with FIPS 140-2 compliant ciphers for HTTPS connections.

    Encryption of data in flight is an essential element of protecting information confidentiality. If a web server uses weak or outdated encryption algorithms, the server's communications could be com...
    Rule High Severity
  • SRG-APP-000015-WSR-000014

    Group
  • VAMI must use cryptography to protect the integrity of remote sessions.

    Data exchanged between the user and the web server can range from static display data to credentials used to log in the hosted application. Even when data appears to be static, the nondisplayed log...
    Rule Medium Severity
  • SRG-APP-000016-WSR-000005

    Group
  • VAMI must be configured to monitor remote access.

    Remote access can be exploited by an attacker to compromise the server. By recording all remote access activities, it will be possible to determine the attacker's location, intent, and degree of su...
    Rule Medium Severity
  • SRG-APP-000089-WSR-000047

    Group
  • SRG-APP-000095-WSR-000056

    Group
  • SRG-APP-000118-WSR-000068

    Group
  • VAMI log files must only be accessible by privileged users.

    Log data is essential in the investigation of events. If log data were to become compromised, competent forensic analysis and discovery of the true source of potentially malicious system activity w...
    Rule Medium Severity
  • SRG-APP-000125-WSR-000071

    Group
  • SRG-APP-000131-WSR-000051

    Group
  • VAMI server binaries and libraries must be verified for their integrity.

    Being able to verify that a patch, upgrade, certificate, etc., being added to the web server is unchanged from the producer of the file is essential for file validation and nonrepudiation of the in...
    Rule Medium Severity
  • SRG-APP-000141-WSR-000075

    Group
  • VAMI must only load allowed server modules.

    A web server can provide many features, services, and processes. Some of these may be deemed unnecessary or too unsecure to run on a production DOD system. VAMI can be configured to load any numb...
    Rule Medium Severity
  • SRG-APP-000141-WSR-000081

    Group
  • SRG-APP-000141-WSR-000081

    Group
  • VAMI must explicitly disable Multipurpose Internet Mail Extensions (MIME) mime mappings based on "Content-Type".

    Controlling what a user of a hosted application can access is part of the security posture of the web server. Any time a user can access more functionality than is needed for the operation of the h...
    Rule Medium Severity
  • SRG-APP-000141-WSR-000082

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules