VMware vSphere 8.0 vCenter Appliance Management Interface (VAMI) Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000176-WSR-000096
<GroupDescription></GroupDescription>Group -
The vCenter VAMI service must restrict access to the web server's private key.
<VulnDiscussion>The web server's private key is used to prove the identity of the server to clients and securely exchange the shared secret k...Rule Medium Severity -
SRG-APP-000179-WSR-000111
<GroupDescription></GroupDescription>Group -
The vCenter VAMI service must enable FIPS mode.
<VulnDiscussion>Encryption is only as good as the encryption modules used. Unapproved cryptographic module algorithms cannot be verified and ...Rule High Severity -
SRG-APP-000246-WSR-000149
<GroupDescription></GroupDescription>Group -
The vCenter VAMI service must restrict the ability of users to launch Denial of Service (DoS) attacks against other information systems or networks.
<VulnDiscussion>In UNIX and related computer operating systems, a file descriptor is an indicator used to access a file or other input/output...Rule Medium Severity -
SRG-APP-000251-WSR-000157
<GroupDescription></GroupDescription>Group -
The vCenter VAMI service must set the encoding for all text mime types to UTF-8.
<VulnDiscussion>Invalid user input occurs when a user inserts data or characters into a hosted application's data entry field and the hosted ...Rule Medium Severity -
SRG-APP-000266-WSR-000142
<GroupDescription></GroupDescription>Group -
The vCenter VAMI service must disable directory listing.
<VulnDiscussion>The goal is to completely control the web user's experience in navigating any portion of the web document root directories. E...Rule Medium Severity -
SRG-APP-000266-WSR-000159
<GroupDescription></GroupDescription>Group -
The vCenter VAMI service must not be configured to use the "mod_status" module.
<VulnDiscussion>Any application providing too much information in error logs and in administrative messages to the screen risks compromising ...Rule Medium Severity -
SRG-APP-000266-WSR-000160
<GroupDescription></GroupDescription>Group -
The vCenter VAMI service must have debug logging disabled.
<VulnDiscussion>Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information abou...Rule Medium Severity -
SRG-APP-000516-WSR-000174
<GroupDescription></GroupDescription>Group -
The vCenter VAMI service must enable honoring the SSL cipher order.
<VulnDiscussion>During a Transport Layer Security (TLS) session negotiation, when choosing a cipher during a handshake, normally the client's...Rule Medium Severity -
SRG-APP-000516-WSR-000174
<GroupDescription></GroupDescription>Group -
The vCenter VAMI service must disable client initiated TLS renegotiation.
<VulnDiscussion>All versions of the Secure Sockets Layer (SSL) and TLS protocols (up to and including TLS 1.2) are vulnerable to a man-in-the...Rule Medium Severity -
SRG-APP-000516-WSR-000174
<GroupDescription></GroupDescription>Group -
The vCenter VAMI service must be configured to hide the server type and version in client responses.
<VulnDiscussion>Web servers will often display error messages to client users, displaying enough information to aid in the debugging of the e...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.