Skip to content

VMware vSphere 7.0 vCenter Appliance Lookup Service Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000001-WSR-000001

    Group
  • SRG-APP-000001-WSR-000001

    Group
  • Lookup Service must limit the number of concurrent connections permitted.

    Resource exhaustion can occur when an unlimited number of concurrent requests are allowed on a website, facilitating a denial-of-service attack. Unless the number of requests is controlled, the web...
    Rule Medium Severity
  • SRG-APP-000001-WSR-000001

    Group
  • Lookup Service must limit the maximum size of a POST request.

    The "maxPostSize" value is the maximum size in bytes of the POST that will be handled by the container FORM URL parameter parsing. Limit its size to reduce exposure to a denial-of-service attack. ...
    Rule Medium Severity
  • SRG-APP-000001-WSR-000002

    Group
  • SRG-APP-000016-WSR-000005

    Group
  • Lookup Service must record user access in a format that enables monitoring of remote access.

    Remote access can be exploited by an attacker to compromise the server. By recording all remote access activities, it will be possible to determine the attacker's location, intent, and degree of su...
    Rule Medium Severity
  • SRG-APP-000089-WSR-000047

    Group
  • SRG-APP-000118-WSR-000068

    Group
  • Lookup Service log files must only be accessible by privileged users.

    Log data is essential in the investigation of events. If log data were to become compromised, competent forensic analysis and discovery of the true source of potentially malicious system activity w...
    Rule Medium Severity
  • SRG-APP-000131-WSR-000051

    Group
  • Lookup Service application files must be verified for their integrity.

    Verifying the Lookup Service application code is unchanged from its shipping state is essential for file validation and nonrepudiation of the Lookup Service. There is no reason the MD5 hash of the ...
    Rule Medium Severity
  • SRG-APP-000131-WSR-000073

    Group
  • Lookup Service must only run one webapp.

    VMware ships Lookup Service on the vCenter Server Appliance (VCSA) with one webapp. Any other path is potentially malicious and must be removed.
    Rule Medium Severity
  • SRG-APP-000141-WSR-000015

    Group
  • Lookup Service must not be configured with the "UserDatabaseRealm" enabled.

    The Lookup Service performs user authentication at the application level and not through Tomcat. By default, there is no configuration for the "UserDatabaseRealm" Tomcat authentication mechanism. A...
    Rule Medium Severity
  • SRG-APP-000141-WSR-000075

    Group
  • Lookup Service must be configured to limit access to internal packages.

    The "package.access" entry in the "catalina.properties" file implements access control at the package level. When properly configured, a Security Exception will be reported if an errant or maliciou...
    Rule Medium Severity
  • SRG-APP-000141-WSR-000081

    Group
  • SRG-APP-000141-WSR-000083

    Group
  • Lookup Service must have mappings set for Java servlet pages.

    Resource mapping is the process of tying a particular file type to a process in the web server that can serve that type of file to a requesting client and identify which file types are not to be de...
    Rule Medium Severity
  • SRG-APP-000141-WSR-000085

    Group
  • Lookup Service must not have the Web Distributed Authoring (WebDAV) servlet installed.

    WebDAV is an extension to the HTTP protocol that, when developed, was meant to allow users to create, change, and move documents on a server, typically a web server or web share. WebDAV is not wide...
    Rule Medium Severity
  • SRG-APP-000141-WSR-000086

    Group
  • Lookup Service must be configured with memory leak protection.

    The Java Runtime environment can cause a memory leak or lock files under certain conditions. Without memory leak protection, Lookup Service can continue to consume system resources, which will lead...
    Rule Medium Severity
  • SRG-APP-000141-WSR-000087

    Group
  • Lookup Service must not have any symbolic links in the web content directory tree.

    A web server is designed to deliver content and execute scripts or applications on the request of a client or user. Containing user requests to files in the directory tree of the hosted web applica...
    Rule Medium Severity
  • SRG-APP-000211-WSR-000030

    Group
  • SRG-APP-000225-WSR-000140

    Group
  • Lookup Service must fail to a known safe state if system initialization fails, shutdown fails, or aborts fail.

    Determining a safe state for failure and weighing that against a potential denial of service for users depends on what type of application the web server is hosting. For the Lookup Service, it is p...
    Rule Medium Severity
  • SRG-APP-000246-WSR-000149

    Group
  • Lookup Service must limit the number of allowed connections.

    Limiting the number of established connections is a basic denial-of-service protection and a best practice. Servers where the limit is too high or unlimited could run out of system resources and ne...
    Rule Medium Severity
  • SRG-APP-000251-WSR-000157

    Group
  • SRG-APP-000266-WSR-000142

    Group
  • Lookup Service must set the welcome-file node to a default web page.

    Enumeration techniques, such as URL parameter manipulation, rely on being able to obtain information about the web server's directory structure by locating directories without default pages. In thi...
    Rule Medium Severity
  • SRG-APP-000266-WSR-000142

    Group
  • SRG-APP-000266-WSR-000159

    Group
  • SRG-APP-000266-WSR-000159

    Group
  • Lookup Service must be configured to show error pages with minimal information.

    Web servers will often display error messages to client users, including enough information to aid in the debugging of the error. The information given back in error messages may display the web se...
    Rule Medium Severity
  • SRG-APP-000266-WSR-000160

    Group
  • Lookup Service must not enable support for TRACE requests.

    "TRACE" is a technique for a user to request internal information about Tomcat. This is useful during product development but should not be enabled in production. Allowing an attacker to conduct a ...
    Rule Medium Severity
  • SRG-APP-000266-WSR-000160

    Group
  • Lookup Service must have the debug option turned off.

    Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information about the web server and plug-ins or modules being used. When debugging or t...
    Rule Medium Severity
  • SRG-APP-000357-WSR-000150

    Group
  • Lookup Service must use a logging mechanism that is configured to allocate log record storage capacity large enough to accommodate the logging requirements of the web server.

    To ensure the logging mechanism used by the web server has sufficient storage capacity in which to write the logs, the logging mechanism must be able to allocate log record storage capacity. Lookup...
    Rule Medium Severity
  • SRG-APP-000358-WSR-000163

    Group
  • SRG-APP-000383-WSR-000175

    Group
  • Lookup Service must be configured with the appropriate ports.

    Web servers provide numerous processes, features, and functionalities that use TCP/IP ports. Some of these processes may be deemed unnecessary or too unsecure to run on a production system. The por...
    Rule Medium Severity
  • SRG-APP-000435-WSR-000147

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules