Skip to content

VMware vSphere 8.0 vCenter Appliance User Interface (UI) Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000001-AS-000001

    Group
  • The vCenter UI service must limit the number of maximum concurrent connections permitted.

    Resource exhaustion can occur when an unlimited number of concurrent requests are allowed on a website, facilitating a denial-of-service attack. Unless the number of requests is controlled, the web...
    Rule Medium Severity
  • SRG-APP-000033-AS-000024

    Group
  • The vCenter UI service cookies must have secure flag set.

    The secure flag is an option that can be set by the application server when sending a new cookie to the user within an HTTP Response. The purpose of the secure flag is to prevent cookies from being...
    Rule Medium Severity
  • SRG-APP-000092-AS-000053

    Group
  • SRG-APP-000095-AS-000056

    Group
  • The vCenter UI service must produce log records containing sufficient information regarding event details.

    Remote access can be exploited by an attacker to compromise the server. By recording all remote access activities, it will be possible to determine the attacker's location, intent, and degree of su...
    Rule Medium Severity
  • SRG-APP-000118-AS-000078

    Group
  • The vCenter UI service must protect logs from unauthorized access.

    Log data is essential in the investigation of events. The accuracy of the information is always pertinent. One of the first steps an attacker will take is the modification or deletion of log record...
    Rule Medium Severity
  • SRG-APP-000133-AS-000092

    Group
  • The vCenter UI service must limit privileges for creating or modifying hosted application shared files.

    Application servers have the ability to specify that the hosted applications use shared libraries. The application server must have a capability to divide roles based upon duties wherein one projec...
    Rule Medium Severity
  • SRG-APP-000141-AS-000095

    Group
  • The vCenter UI service must disable stack tracing.

    Stack tracing provides debugging information from the application call stacks when a runtime error is encountered. If stack tracing is left enabled, Tomcat will provide this call stack information ...
    Rule Medium Severity
  • SRG-APP-000142-AS-000014

    Group
  • SRG-APP-000223-AS-000150

    Group
  • The vCenter UI service must be configured to limit data exposure between applications.

    If RECYCLE_FACADES is true or if a security manager is in use, a new facade object will be created for each request. This reduces the chances that a bug in an application might expose data from one...
    Rule Medium Severity
  • SRG-APP-000225-AS-000166

    Group
  • The vCenter UI service must be configured to fail to a known safe state if system initialization fails.

    Determining a safe state for failure and weighing that against a potential denial of service for users depends on what type of application the web server is hosting. It is preferable that the servi...
    Rule Medium Severity
  • SRG-APP-000251-AS-000165

    Group
  • The vCenter UI service must set URIEncoding to UTF-8.

    Invalid user input occurs when a user inserts data or characters into a hosted application's data entry field and the hosted application is unprepared to process that data. This results in unantici...
    Rule Medium Severity
  • SRG-APP-000266-AS-000169

    Group
  • The vCenter UI service "ErrorReportValve showServerInfo" must be set to "false".

    The Error Report Valve is a simple error handler for HTTP status codes that will generate and return HTML error pages. It can also be configured to return predefined static HTML pages for specific ...
    Rule Medium Severity
  • SRG-APP-000295-AS-000263

    Group
  • The vCenter UI service must set an inactive timeout for sessions.

    Leaving sessions open indefinitely is a major security risk. An attacker can easily use an already authenticated session to access the hosted application as the previously authenticated user. By cl...
    Rule Medium Severity
  • SRG-APP-000358-AS-000064

    Group
  • SRG-APP-000516-AS-000237

    Group
  • The vCenter UI service must enable "STRICT_SERVLET_COMPLIANCE".

    Strict Servlet Compliance forces Tomcat to adhere to standards specifications including but not limited to RFC2109. RFC2109 sets the standard for HTTP session management. This setting affects sever...
    Rule Medium Severity
  • SRG-APP-000001-AS-000001

    Group
  • The vCenter UI service must limit the amount of time that each Transmission Control Protocol (TCP) connection is kept alive.

    Denial of service (DoS) is one threat against web servers. Many DoS attacks attempt to consume web server resources in such a way that no more resources are available to satisfy legitimate requests...
    Rule Medium Severity
  • SRG-APP-000001-AS-000001

    Group
  • The vCenter UI service must limit the number of times that each Transmission Control Protocol (TCP) connection is kept alive.

    KeepAlive provides long lived HTTP sessions that allow multiple requests to be sent over the same connection. Enabling KeepAlive mitigates the effects of several types of denial-of-service attacks....
    Rule Medium Severity
  • SRG-APP-000251-AS-000165

    Group
  • SRG-APP-000033-AS-000024

    Group
  • The vCenter UI service cookies must have "http-only" flag set.

    Cookies are a common way to save session state over the HTTP(S) protocol. If attackers can compromise session data stored in a cookie, they are better able to launch an attack against the server an...
    Rule Medium Severity
  • SRG-APP-000033-AS-000024

    Group
  • SRG-APP-000141-AS-000095

    Group
  • The vCenter UI service shutdown port must be disabled.

    Tomcat by default listens on TCP port 8005 to accept shutdown requests. By connecting to this port and sending the SHUTDOWN command, all applications within Tomcat are halted. The shutdown port is ...
    Rule Medium Severity
  • SRG-APP-000141-AS-000095

    Group
  • The vCenter UI service debug parameter must be disabled.

    Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information about the web server and plug-ins or modules being used. When debugging or t...
    Rule Medium Severity
  • SRG-APP-000141-AS-000095

    Group
  • SRG-APP-000141-AS-000095

    Group
  • The vCenter UI service deployXML attribute must be disabled.

    The Host element controls deployment. Automatic deployment allows for simpler management but also makes it easier for an attacker to deploy a malicious application. Automatic deployment is controll...
    Rule Medium Severity
  • SRG-APP-000141-AS-000095

    Group
  • The vCenter UI service must have Autodeploy disabled.

    Tomcat allows auto-deployment of applications while it is running. This can allow untested or malicious applications to be automatically loaded into production. Autodeploy must be disabled in produ...
    Rule Medium Severity
  • SRG-APP-000141-AS-000095

    Group
  • SRG-APP-000141-AS-000095

    Group
  • The vCenter UI service example applications must be removed.

    Tomcat provides example applications, documentation, and other directories in the default installation that do not serve a production use. These files must be deleted.
    Rule Medium Severity
  • SRG-APP-000141-AS-000095

    Group
  • The vCenter UI service default ROOT web application must be removed.

    The default ROOT web application includes the version of Tomcat being used, links to Tomcat documentation, examples, FAQs, and mailing lists. The default ROOT web application must be removed from a...
    Rule Medium Severity
  • SRG-APP-000141-AS-000095

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules