Skip to content

VMware vSphere 8.0 vCenter Appliance Secure Token Service (STS) Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000014-AS-000009

    <GroupDescription></GroupDescription>
    Group
  • The vCenter STS service must be configured to use strong encryption ciphers.

    &lt;VulnDiscussion&gt;Tomcat has several remote communications channels. Examples are user requests via http/https, communication to a backend data...
    Rule Medium Severity
  • SRG-APP-000033-AS-000024

    <GroupDescription></GroupDescription>
    Group
  • The vCenter STS service cookies must have secure flag set.

    &lt;VulnDiscussion&gt;The secure flag is an option that can be set by the application server when sending a new cookie to the user within an HTTP R...
    Rule Medium Severity
  • SRG-APP-000092-AS-000053

    <GroupDescription></GroupDescription>
    Group
  • The vCenter STS service must initiate session logging upon startup.

    &lt;VulnDiscussion&gt;Logging must be started as soon as possible when a service starts and as late as possible when a service is stopped. Many for...
    Rule Medium Severity
  • SRG-APP-000095-AS-000056

    <GroupDescription></GroupDescription>
    Group
  • The vCenter STS service must produce log records containing sufficient information regarding event details.

    &lt;VulnDiscussion&gt;Remote access can be exploited by an attacker to compromise the server. By recording all remote access activities, it will be...
    Rule Medium Severity
  • SRG-APP-000118-AS-000078

    <GroupDescription></GroupDescription>
    Group
  • The vCenter STS service logs folder permissions must be set correctly.

    &lt;VulnDiscussion&gt;Log data is essential in the investigation of events. The accuracy of the information is always pertinent. One of the first s...
    Rule Medium Severity
  • SRG-APP-000133-AS-000092

    <GroupDescription></GroupDescription>
    Group
  • The vCenter STS service must limit privileges for creating or modifying hosted application shared files.

    &lt;VulnDiscussion&gt;Application servers have the ability to specify that the hosted applications use shared libraries. The application server mus...
    Rule Medium Severity
  • SRG-APP-000141-AS-000095

    <GroupDescription></GroupDescription>
    Group
  • The vCenter STS service must disable stack tracing.

    &lt;VulnDiscussion&gt;Stack tracing provides debugging information from the application call stacks when a runtime error is encountered. If stack t...
    Rule Medium Severity
  • SRG-APP-000142-AS-000014

    <GroupDescription></GroupDescription>
    Group
  • The vCenter STS service must be configured to use a specified IP address and port.

    &lt;VulnDiscussion&gt;The server must be configured to listen on a specified IP address and port. Without specifying an IP address and port for ser...
    Rule Medium Severity
  • SRG-APP-000223-AS-000150

    <GroupDescription></GroupDescription>
    Group
  • The vCenter STS service must be configured to limit data exposure between applications.

    &lt;VulnDiscussion&gt;If RECYCLE_FACADES is true or if a security manager is in use, a new facade object will be created for each request. This red...
    Rule Medium Severity
  • SRG-APP-000225-AS-000166

    <GroupDescription></GroupDescription>
    Group
  • The vCenter STS service must be configured to fail to a known safe state if system initialization fails.

    &lt;VulnDiscussion&gt;Determining a safe state for failure and weighing that against a potential denial of service for users depends on what type o...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules