Skip to content

VMware vSphere 8.0 vCenter Appliance Secure Token Service (STS) Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000001-AS-000001

    Group
  • SRG-APP-000033-AS-000024

    Group
  • The vCenter STS service cookies must have secure flag set.

    The secure flag is an option that can be set by the application server when sending a new cookie to the user within an HTTP Response. The purpose of the secure flag is to prevent cookies from being...
    Rule Medium Severity
  • SRG-APP-000092-AS-000053

    Group
  • SRG-APP-000095-AS-000056

    Group
  • The vCenter STS service must produce log records containing sufficient information regarding event details.

    Remote access can be exploited by an attacker to compromise the server. By recording all remote access activities, it will be possible to determine the attacker's location, intent, and degree of su...
    Rule Medium Severity
  • SRG-APP-000118-AS-000078

    Group
  • The vCenter STS service logs folder permissions must be set correctly.

    Log data is essential in the investigation of events. The accuracy of the information is always pertinent. One of the first steps an attacker will take is the modification or deletion of log record...
    Rule Medium Severity
  • SRG-APP-000133-AS-000092

    Group
  • SRG-APP-000141-AS-000095

    Group
  • The vCenter STS service must disable stack tracing.

    Stack tracing provides debugging information from the application call stacks when a runtime error is encountered. If stack tracing is left enabled, Tomcat will provide this call stack information ...
    Rule Medium Severity
  • SRG-APP-000142-AS-000014

    Group
  • The vCenter STS service must be configured to use a specified IP address and port.

    The server must be configured to listen on a specified IP address and port. Without specifying an IP address and port for server to use, the server will listen on all IP addresses available. Acces...
    Rule Medium Severity
  • SRG-APP-000223-AS-000150

    Group
  • The vCenter STS service must be configured to limit data exposure between applications.

    If RECYCLE_FACADES is true or if a security manager is in use, a new facade object will be created for each request. This reduces the chances that a bug in an application might expose data from one...
    Rule Medium Severity
  • SRG-APP-000225-AS-000166

    Group
  • The vCenter STS service must be configured to fail to a known safe state if system initialization fails.

    Determining a safe state for failure and weighing that against a potential denial of service for users depends on what type of application the web server is hosting. It is preferable that the servi...
    Rule Medium Severity
  • SRG-APP-000251-AS-000165

    Group
  • The vCenter STS service must set URIEncoding to UTF-8.

    Invalid user input occurs when a user inserts data or characters into a hosted application's data entry field and the hosted application is unprepared to process that data. This results in unantici...
    Rule Medium Severity
  • SRG-APP-000266-AS-000169

    Group
  • SRG-APP-000295-AS-000263

    Group
  • The vCenter STS service must set an inactive timeout for sessions.

    Leaving sessions open indefinitely is a major security risk. An attacker can easily use an already authenticated session to access the hosted application as the previously authenticated user. By cl...
    Rule Medium Severity
  • SRG-APP-000358-AS-000064

    Group
  • The vCenter STS service must offload log records onto a different system or media from the system being logged.

    Information system logging capability is critical for accurate forensic analysis. Log record content that may be necessary to satisfy the requirement of this control includes, but is not limited to...
    Rule Medium Severity
  • SRG-APP-000001-AS-000001

    Group
  • The vCenter STS service must limit the amount of time that each Transmission Control Protocol (TCP) connection is kept alive.

    Denial of service (DoS) is one threat against web servers. Many DoS attacks attempt to consume web server resources in such a way that no more resources are available to satisfy legitimate requests...
    Rule Medium Severity
  • SRG-APP-000001-AS-000001

    Group
  • The vCenter STS service must limit the number of times that each Transmission Control Protocol (TCP) connection is kept alive.

    KeepAlive provides long lived HTTP sessions that allow multiple requests to be sent over the same connection. Enabling KeepAlive mitigates the effects of several types of denial-of-service attacks....
    Rule Medium Severity
  • SRG-APP-000251-AS-000165

    Group
  • SRG-APP-000033-AS-000024

    Group
  • The vCenter STS service cookies must have "http-only" flag set.

    Cookies are a common way to save session state over the HTTP(S) protocol. If attackers can compromise session data stored in a cookie, they are better able to launch an attack against the server an...
    Rule Medium Severity
  • SRG-APP-000033-AS-000024

    Group
  • SRG-APP-000141-AS-000095

    Group
  • The vCenter STS service shutdown port must be disabled.

    Tomcat by default listens on TCP port 8005 to accept shutdown requests. By connecting to this port and sending the SHUTDOWN command, all applications within Tomcat are halted. The shutdown port is ...
    Rule Medium Severity
  • SRG-APP-000141-AS-000095

    Group
  • The vCenter STS service debug parameter must be disabled.

    Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information about the web server and plug-ins or modules being used. When debugging or t...
    Rule Medium Severity
  • SRG-APP-000141-AS-000095

    Group
  • SRG-APP-000141-AS-000095

    Group
  • The vCenter STS service must have Autodeploy disabled.

    Tomcat allows auto-deployment of applications while it is running. This can allow untested or malicious applications to be automatically loaded into production. Autodeploy must be disabled in produ...
    Rule Medium Severity
  • SRG-APP-000141-AS-000095

    Group
  • The vCenter STS service xpoweredBy attribute must be disabled.

    Individual connectors can be configured to display the Tomcat information to clients. This information can be used to identify server versions that can be useful to attackers for identifying vulner...
    Rule Medium Severity
  • SRG-APP-000141-AS-000095

    Group
  • The vCenter STS service example applications must be removed.

    Tomcat provides example applications, documentation, and other directories in the default installation that do not serve a production use. These files must be deleted.
    Rule Medium Severity
  • SRG-APP-000141-AS-000095

    Group
  • The vCenter STS service default ROOT web application must be removed.

    The default ROOT web application includes the version of Tomcat being used, links to Tomcat documentation, examples, FAQs, and mailing lists. The default ROOT web application must be removed from a...
    Rule Medium Severity
  • SRG-APP-000141-AS-000095

    Group
  • The vCenter STS service default documentation must be removed.

    Tomcat provides documentation and other directories in the default installation that do not serve a production use. These files must be deleted.
    Rule Medium Severity
  • SRG-APP-000380-AS-000088

    Group
  • SRG-APP-000516-AS-000237

    Group
  • The vCenter STS service must disable "ALLOW_BACKSLASH".

    When Tomcat is installed behind a proxy configured to only allow access to certain contexts (web applications), an HTTP request containing "/\../" may allow attackers to work around the proxy restr...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules