VMware vSphere 7.0 vCenter Appliance STS Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000001-WSR-000001
Group -
The Security Token Service must limit the amount of time that each Transmission Control Protocol (TCP) connection is kept alive.
Denial of service (DoS) is one threat against web servers. Many DoS attacks attempt to consume web server resources in such a way that no more resources are available to satisfy legitimate requests...Rule Medium Severity -
SRG-APP-000001-WSR-000001
Group -
The Security Token Service must limit the number of concurrent connections permitted.
Resource exhaustion can occur when an unlimited number of concurrent requests are allowed on a website, facilitating a denial-of-service attack. Unless the number of requests is controlled, the web...Rule Medium Severity -
SRG-APP-000001-WSR-000001
Group -
The Security Token Service must limit the maximum size of a POST request.
The "maxPostSize" value is the maximum size in bytes of the POST that will be handled by the container FORM URL parameter parsing. Limit its size to reduce exposure to a denial-of-service (DoS) att...Rule Medium Severity -
SRG-APP-000001-WSR-000002
Group -
The Security Token Service must protect cookies from cross-site scripting (XSS).
Cookies are a common way to save session state over the HTTP(S) protocol. If an attacker can compromise session data stored in a cookie, they are better able to launch an attack against the server ...Rule Medium Severity -
SRG-APP-000016-WSR-000005
Group -
SRG-APP-000089-WSR-000047
Group -
The Security Token Service must generate log records during Java startup and shutdown.
Logging must be started as soon as possible when a service starts and as late as possible when a service is stopped. Many forms of suspicious actions can be detected by analyzing logs for unexpecte...Rule Medium Severity -
SRG-APP-000119-WSR-000069
Group -
Security Token Service log files must only be modifiable by privileged users.
Log data is essential in the investigation of events. The accuracy of the information is always pertinent. One of the first steps an attacker will undertake is the modification or deletion of log r...Rule Medium Severity -
SRG-APP-000131-WSR-000051
Group -
The Security Token Service application files must be verified for their integrity.
Verifying the Security Token Service application code is unchanged from its shipping state is essential for file validation and nonrepudiation of the Security Token Service. There is no reason the ...Rule Medium Severity -
SRG-APP-000131-WSR-000073
Group -
The Security Token Service must only run one webapp.
VMware ships the Security Token Service on the vCenter Server Appliance (VCSA) with one webapp, in "ROOT.war". Any other ".war" file is potentially malicious and must be removed. Satisfies: SRG-AP...Rule Medium Severity -
SRG-APP-000141-WSR-000015
Group -
SRG-APP-000141-WSR-000075
Group -
SRG-APP-000141-WSR-000081
Group -
The Security Token Service must have Multipurpose Internet Mail Extensions (MIME) that invoke operating system shell programs disabled.
MIME mappings tell the Security Token Service what type of program various file types and extensions are and what external utilities or programs are needed to execute the file type. By ensuring ...Rule Medium Severity -
SRG-APP-000141-WSR-000083
Group -
The Security Token Service must have mappings set for Java servlet pages.
Resource mapping is the process of tying a particular file type to a process in the web server that can serve that type of file to a requesting client and identify which file types are not to be de...Rule Medium Severity -
SRG-APP-000141-WSR-000085
Group -
The Security Token Service must not have the Web Distributed Authoring (WebDAV) servlet installed.
WebDAV is an extension to the HTTP protocol that, when developed, was meant to allow users to create, change, and move documents on a server, typically a web server or web share. WebDAV is not wide...Rule Medium Severity -
SRG-APP-000141-WSR-000086
Group -
The Security Token Service must be configured with memory leak protection.
The Java Runtime environment can cause a memory leak or lock files under certain conditions. Without memory leak protection, the Security Token Service can continue to consume system resources whic...Rule Medium Severity -
SRG-APP-000141-WSR-000087
Group -
SRG-APP-000211-WSR-000030
Group -
The Security Token Service directory tree must have permissions in an out-of-the-box state.
As a rule, accounts on a web server are to be kept to a minimum. Only administrators, web managers, developers, auditors, and web authors require accounts on the machine hosting the web server. The...Rule Medium Severity -
SRG-APP-000225-WSR-000140
Group -
The Security Token Service must fail to a known safe state if system initialization fails, shutdown fails, or aborts fail.
Determining a safe state for failure and weighing that against a potential denial of service for users depends on what type of application the web server is hosting. For the Security Token Service,...Rule Medium Severity -
SRG-APP-000246-WSR-000149
Group -
The Security Token Service must limit the number of allowed connections.
Limiting the number of established connections to the Security Token Service is a basic denial-of-service protection. Servers where the limit is too high or unlimited can potentially run out of sys...Rule Medium Severity -
SRG-APP-000251-WSR-000157
Group -
The Security Token Service must set "URIEncoding" to UTF-8.
Invalid user input occurs when a user inserts data or characters into a hosted application's data entry field and the hosted application is unprepared to process that data. This results in unantici...Rule Medium Severity -
SRG-APP-000251-WSR-000157
Group -
SRG-APP-000266-WSR-000142
Group -
The Security Token Service must set the welcome-file node to a default web page.
Enumeration techniques, such as Uniform Resource Locator (URL) parameter manipulation, rely on being able to obtain information about the web server's directory structure by locating directories wi...Rule Medium Severity -
SRG-APP-000266-WSR-000142
Group -
SRG-APP-000266-WSR-000159
Group -
The Security Token Service must be configured to not show error reports.
Web servers will often display error messages to client users, displaying enough information to aid in the debugging of the error. The information given back in error messages may display the web s...Rule Medium Severity -
SRG-APP-000266-WSR-000160
Group -
The Security Token Service must not enable support for TRACE requests.
"TRACE" is a technique for a user to request internal information about Tomcat. This is useful during product development but should not be enabled in production. Allowing an attacker to conduct a ...Rule Medium Severity -
SRG-APP-000266-WSR-000160
Group -
SRG-APP-000383-WSR-000175
Group -
The Security Token Service must be configured with the appropriate ports.
Web servers provide numerous processes, features, and functionalities that use TCP/IP ports. Some of these processes may be deemed unnecessary or too unsecure to run on a production system. The por...Rule Medium Severity -
SRG-APP-000435-WSR-000147
Group -
The Security Token Service must disable the shutdown port.
An attacker has at least two reasons to stop a web server. The first is to cause a denial of service, and the second is to put in place changes the attacker made to the web server configuration. ...Rule Medium Severity -
SRG-APP-000439-WSR-000155
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.