Skip to content

VMware vSphere 7.0 vCenter Appliance STS Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000266-WSR-000159

    Group
  • The Security Token Service must be configured to not show error reports.

    Web servers will often display error messages to client users, displaying enough information to aid in the debugging of the error. The information given back in error messages may display the web s...
    Rule Medium Severity
  • SRG-APP-000266-WSR-000160

    Group
  • The Security Token Service must not enable support for TRACE requests.

    "TRACE" is a technique for a user to request internal information about Tomcat. This is useful during product development but should not be enabled in production. Allowing an attacker to conduct a ...
    Rule Medium Severity
  • SRG-APP-000266-WSR-000160

    Group
  • SRG-APP-000383-WSR-000175

    Group
  • The Security Token Service must be configured with the appropriate ports.

    Web servers provide numerous processes, features, and functionalities that use TCP/IP ports. Some of these processes may be deemed unnecessary or too unsecure to run on a production system. The por...
    Rule Medium Severity
  • SRG-APP-000435-WSR-000147

    Group
  • The Security Token Service must disable the shutdown port.

    An attacker has at least two reasons to stop a web server. The first is to cause a denial of service, and the second is to put in place changes the attacker made to the web server configuration. ...
    Rule Medium Severity
  • SRG-APP-000439-WSR-000155

    Group
  • The Security Token Service must set the secure flag for cookies.

    The secure flag is an option that can be set by the application server when sending a new cookie to the user within an HTTP Response. The purpose of the secure flag is to prevent cookies from being...
    Rule Medium Severity
  • SRG-APP-000516-WSR-000174

    Group
  • SRG-APP-000125-WSR-000071

    Group
  • The Security Token Service must record user access in a format that enables monitoring of remote access.

    Remote access can be exploited by an attacker to compromise the server. By recording all remote access activities, it will be possible to determine the attacker's location, intent, and degree of su...
    Rule Medium Severity
  • The Security Token Service must not be configured with unused realms.

    The Security Token Service performs user authentication at the application level and not through Tomcat. To eliminate unnecessary features and ensure the Security Token Service remains in its shipp...
    Rule Medium Severity
  • The Security Token Service must be configured to limit access to internal packages.

    The "package.access" entry in the "catalina.properties" file implements access control at the package level. When properly configured, a Security Exception will be reported if an errant or maliciou...
    Rule Medium Severity
  • The Security Token Service must not have any symbolic links in the web content directory tree.

    A web server is designed to deliver content and execute scripts or applications on the request of a client or user. Containing user requests to files in the directory tree of the hosted web applica...
    Rule Medium Severity
  • The Security Token Service must use the "setCharacterEncodingFilter" filter.

    Invalid user input occurs when a user inserts data or characters into a hosted application's data entry field and the hosted application is unprepared to process that data. This results in unantici...
    Rule Medium Severity
  • The Security Token Service must not show directory listings.

    Enumeration techniques, such as Uniform Resource Locator (URL) parameter manipulation, rely on being able to obtain information about the web server's directory structure by locating directories wi...
    Rule Medium Severity
  • The Security Token Service must have the debug option disabled.

    Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information about the web server and plug-ins or modules being used. When debugging or t...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules