Skip to content

VMware vSphere 7.0 vCenter Appliance STS Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000001-WSR-000001

    Group
  • The Security Token Service must limit the amount of time that each Transmission Control Protocol (TCP) connection is kept alive.

    Denial of service (DoS) is one threat against web servers. Many DoS attacks attempt to consume web server resources in such a way that no more resources are available to satisfy legitimate requests...
    Rule Medium Severity
  • SRG-APP-000001-WSR-000001

    Group
  • The Security Token Service must limit the number of concurrent connections permitted.

    Resource exhaustion can occur when an unlimited number of concurrent requests are allowed on a website, facilitating a denial-of-service attack. Unless the number of requests is controlled, the web...
    Rule Medium Severity
  • SRG-APP-000001-WSR-000001

    Group
  • The Security Token Service must limit the maximum size of a POST request.

    The "maxPostSize" value is the maximum size in bytes of the POST that will be handled by the container FORM URL parameter parsing. Limit its size to reduce exposure to a denial-of-service (DoS) att...
    Rule Medium Severity
  • SRG-APP-000001-WSR-000002

    Group
  • The Security Token Service must protect cookies from cross-site scripting (XSS).

    Cookies are a common way to save session state over the HTTP(S) protocol. If an attacker can compromise session data stored in a cookie, they are better able to launch an attack against the server ...
    Rule Medium Severity
  • SRG-APP-000016-WSR-000005

    Group
  • SRG-APP-000089-WSR-000047

    Group
  • The Security Token Service must generate log records during Java startup and shutdown.

    Logging must be started as soon as possible when a service starts and as late as possible when a service is stopped. Many forms of suspicious actions can be detected by analyzing logs for unexpecte...
    Rule Medium Severity
  • SRG-APP-000119-WSR-000069

    Group
  • Security Token Service log files must only be modifiable by privileged users.

    Log data is essential in the investigation of events. The accuracy of the information is always pertinent. One of the first steps an attacker will undertake is the modification or deletion of log r...
    Rule Medium Severity
  • SRG-APP-000131-WSR-000051

    Group
  • The Security Token Service application files must be verified for their integrity.

    Verifying the Security Token Service application code is unchanged from its shipping state is essential for file validation and nonrepudiation of the Security Token Service. There is no reason the ...
    Rule Medium Severity
  • SRG-APP-000131-WSR-000073

    Group
  • The Security Token Service must only run one webapp.

    VMware ships the Security Token Service on the vCenter Server Appliance (VCSA) with one webapp, in "ROOT.war". Any other ".war" file is potentially malicious and must be removed. Satisfies: SRG-AP...
    Rule Medium Severity
  • SRG-APP-000141-WSR-000015

    Group
  • SRG-APP-000141-WSR-000075

    Group
  • SRG-APP-000141-WSR-000081

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules