VMware Horizon 7.13 Connection Server Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000001-AS-000001
Group -
The Horizon Connection Server must limit the number of concurrent client sessions.
The Horizon Connection Server has the ability to limit the number of simultaneous client connections. This capability is helpful in limiting resource exhaustion risks related to denial of service a...Rule Medium Severity -
The Horizon Connection Server administrators must be limited in terms of quantity, scope, and permissions.
Role based access and least privilege are two fundamental security concepts that must be properly implemented in Horizon View to ensure the right user and groups have the right permissions on the r...Rule Medium Severity -
The Horizon Connection Server must validate client and administrator certificates.
The Horizon Connection Server can be configured to check the revocation status of PKI certificates over both OCSP and CRL. This capability is disabled by default and must be enabled post-deployment...Rule Medium Severity -
The Horizon Connection Server must only use FIPS 140-2 validated cryptographic modules.
Encryption is only as good as the encryption modules utilized. Unapproved cryptographic module algorithms cannot be verified and cannot be relied upon to provide confidentiality or integrity, and D...Rule High Severity -
The Horizon Connection Server must be configured with a DoD-issued TLS certificate.
The DoD will only accept PKI certificates obtained from a DoD-approved internal or external certificate authority (CA). If the CA used for verifying the certificate is not DoD-approved, trust of th...Rule Medium Severity -
The Horizon Connection Server must discard SSO credentials after 15 minutes.
Horizon Connection Server caches user credentials temporarily to ensure that the user can connect to their desktop pools without reauthenticating, right after logging in to the broker. However, thi...Rule Medium Severity -
The Horizon Connection Server must require DoD PKI for client logins.
Before clients can pick a desktop or app to access, they must first authenticate to the broker, the Connection Server itself. If the client is accessing the broker directly, then the allowed authen...Rule Medium Severity -
The Horizon Connection Server must have Origin Checking enabled.
RFC 6454 Origin Checking, which protects against cross-site request forging, is enabled by default on the Horizon Connection Server. When an administrator opens the Horizon 7 Console or a user conn...Rule Medium Severity -
The Horizon Connection Server must enable the proper Content Security Policy directives.
The Horizon Connection Server Content Security Policy (CSP) feature mitigates a broad class of content injection vulnerabilities such as cross-site scripting (XSS), clickjacking and other code inje...Rule Medium Severity -
The Horizon Connection Server must be configured to debug level logging.
To ensure that all security-relevant information and events are logged, the Horizon Connection Server must be configured with the "debug" logging level. This is the default value but since it could...Rule Medium Severity -
SRG-APP-000033-AS-000024
Group -
The Horizon Connection Server must not accept pass-through client credentials.
Horizon Connection Server has the ability to allow clients to authenticate using the local session credentials of their local endpoint. While convenient, this must be disabled for DoD deployments a...Rule Medium Severity -
SRG-APP-000516-AS-000237
Group -
SRG-APP-000015-AS-000010
Group -
The Horizon Connection Server must be configured to only support TLS 1.2 connections.
Preventing the disclosure of transmitted information requires that the application server take measures to employ strong cryptographic mechanisms to protect the information during transmission. Thi...Rule High Severity -
SRG-APP-000015-AS-000010
Group -
The Blast Secure Gateway must be configured to only support TLS 1.2 connections.
Preventing the disclosure of transmitted information requires that the application server take measures to employ strong cryptographic mechanisms to protect the information during transmission. Thi...Rule High Severity -
SRG-APP-000015-AS-000010
Group -
The Horizon Connection Server must force server cipher preference.
By default, during the initial setup of a Transport Layer Security (TLS) connection to the Horizon Connection Server, the client sends a list of supported cipher suites in order of preference. The ...Rule High Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.