Skip to content

VMware vSphere 8.0 vCenter Appliance Secure Token Service (STS) Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000133-AS-000092

    <GroupDescription></GroupDescription>
    Group
  • SRG-APP-000033-AS-000024

    <GroupDescription></GroupDescription>
    Group
  • The vCenter STS service cookies must have secure flag set.

    &lt;VulnDiscussion&gt;The secure flag is an option that can be set by the application server when sending a new cookie to the user within an HTTP R...
    Rule Medium Severity
  • SRG-APP-000092-AS-000053

    <GroupDescription></GroupDescription>
    Group
  • The vCenter STS service must initiate session logging upon startup.

    &lt;VulnDiscussion&gt;Logging must be started as soon as possible when a service starts and as late as possible when a service is stopped. Many for...
    Rule Medium Severity
  • SRG-APP-000095-AS-000056

    <GroupDescription></GroupDescription>
    Group
  • The vCenter STS service must produce log records containing sufficient information regarding event details.

    &lt;VulnDiscussion&gt;Remote access can be exploited by an attacker to compromise the server. By recording all remote access activities, it will be...
    Rule Medium Severity
  • SRG-APP-000118-AS-000078

    <GroupDescription></GroupDescription>
    Group
  • The vCenter STS service logs folder permissions must be set correctly.

    &lt;VulnDiscussion&gt;Log data is essential in the investigation of events. The accuracy of the information is always pertinent. One of the first s...
    Rule Medium Severity
  • The vCenter STS service must limit privileges for creating or modifying hosted application shared files.

    &lt;VulnDiscussion&gt;Application servers have the ability to specify that the hosted applications use shared libraries. The application server mus...
    Rule Medium Severity
  • SRG-APP-000141-AS-000095

    <GroupDescription></GroupDescription>
    Group
  • The vCenter STS service must disable stack tracing.

    &lt;VulnDiscussion&gt;Stack tracing provides debugging information from the application call stacks when a runtime error is encountered. If stack t...
    Rule Medium Severity
  • SRG-APP-000142-AS-000014

    <GroupDescription></GroupDescription>
    Group
  • The vCenter STS service must be configured to use a specified IP address and port.

    &lt;VulnDiscussion&gt;The server must be configured to listen on a specified IP address and port. Without specifying an IP address and port for ser...
    Rule Medium Severity
  • SRG-APP-000223-AS-000150

    <GroupDescription></GroupDescription>
    Group
  • The vCenter STS service must be configured to limit data exposure between applications.

    &lt;VulnDiscussion&gt;If RECYCLE_FACADES is true or if a security manager is in use, a new facade object will be created for each request. This red...
    Rule Medium Severity
  • SRG-APP-000225-AS-000166

    <GroupDescription></GroupDescription>
    Group
  • The vCenter STS service must be configured to fail to a known safe state if system initialization fails.

    &lt;VulnDiscussion&gt;Determining a safe state for failure and weighing that against a potential denial of service for users depends on what type o...
    Rule Medium Severity
  • SRG-APP-000251-AS-000165

    <GroupDescription></GroupDescription>
    Group
  • The vCenter STS service must set URIEncoding to UTF-8.

    &lt;VulnDiscussion&gt;Invalid user input occurs when a user inserts data or characters into a hosted application's data entry field and the hosted ...
    Rule Medium Severity
  • SRG-APP-000266-AS-000169

    <GroupDescription></GroupDescription>
    Group
  • SRG-APP-000516-AS-000237

    <GroupDescription></GroupDescription>
    Group
  • The vCenter STS service "ErrorReportValve showServerInfo" must be set to "false".

    &lt;VulnDiscussion&gt;The Error Report Valve is a simple error handler for HTTP status codes that will generate and return HTML error pages. It can...
    Rule Medium Severity
  • SRG-APP-000295-AS-000263

    <GroupDescription></GroupDescription>
    Group
  • The vCenter STS service must set an inactive timeout for sessions.

    &lt;VulnDiscussion&gt;Leaving sessions open indefinitely is a major security risk. An attacker can easily use an already authenticated session to a...
    Rule Medium Severity
  • SRG-APP-000358-AS-000064

    <GroupDescription></GroupDescription>
    Group
  • The vCenter STS service must offload log records onto a different system or media from the system being logged.

    &lt;VulnDiscussion&gt;Information system logging capability is critical for accurate forensic analysis. Log record content that may be necessary to...
    Rule Medium Severity
  • SRG-APP-000001-AS-000001

    <GroupDescription></GroupDescription>
    Group
  • The vCenter STS service must limit the amount of time that each Transmission Control Protocol (TCP) connection is kept alive.

    &lt;VulnDiscussion&gt;Denial of service (DoS) is one threat against web servers. Many DoS attacks attempt to consume web server resources in such a...
    Rule Medium Severity
  • SRG-APP-000001-AS-000001

    <GroupDescription></GroupDescription>
    Group
  • The vCenter STS service must limit the number of times that each Transmission Control Protocol (TCP) connection is kept alive.

    &lt;VulnDiscussion&gt;KeepAlive provides long lived HTTP sessions that allow multiple requests to be sent over the same connection. Enabling KeepAl...
    Rule Medium Severity
  • SRG-APP-000251-AS-000165

    <GroupDescription></GroupDescription>
    Group
  • The vCenter STS service must configure the "setCharacterEncodingFilter" filter.

    &lt;VulnDiscussion&gt;Invalid user input occurs when a user inserts data or characters into a hosted application's data entry field and the hosted ...
    Rule Medium Severity
  • SRG-APP-000033-AS-000024

    <GroupDescription></GroupDescription>
    Group
  • The vCenter STS service cookies must have "http-only" flag set.

    &lt;VulnDiscussion&gt;Cookies are a common way to save session state over the HTTP(S) protocol. If attackers can compromise session data stored in ...
    Rule Medium Severity
  • SRG-APP-000033-AS-000024

    <GroupDescription></GroupDescription>
    Group
  • The vCenter STS service DefaultServlet must be set to "readonly" for "PUT" and "DELETE" commands.

    &lt;VulnDiscussion&gt;The default servlet (or DefaultServlet) is a special servlet provided with Tomcat that is called when no other suitable page ...
    Rule Medium Severity
  • SRG-APP-000141-AS-000095

    <GroupDescription></GroupDescription>
    Group
  • The vCenter STS service shutdown port must be disabled.

    &lt;VulnDiscussion&gt;Tomcat by default listens on TCP port 8005 to accept shutdown requests. By connecting to this port and sending the SHUTDOWN c...
    Rule Medium Severity
  • SRG-APP-000141-AS-000095

    <GroupDescription></GroupDescription>
    Group
  • The vCenter STS service debug parameter must be disabled.

    &lt;VulnDiscussion&gt;Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information abou...
    Rule Medium Severity
  • SRG-APP-000141-AS-000095

    <GroupDescription></GroupDescription>
    Group
  • The vCenter STS service directory listings parameter must be disabled.

    &lt;VulnDiscussion&gt;Enumeration techniques, such as URL parameter manipulation, rely on being able to obtain information about the web server's d...
    Rule Medium Severity
  • SRG-APP-000141-AS-000095

    <GroupDescription></GroupDescription>
    Group
  • The vCenter STS service must have Autodeploy disabled.

    &lt;VulnDiscussion&gt;Tomcat allows auto-deployment of applications while it is running. This can allow untested or malicious applications to be au...
    Rule Medium Severity
  • SRG-APP-000141-AS-000095

    <GroupDescription></GroupDescription>
    Group
  • The vCenter STS service xpoweredBy attribute must be disabled.

    &lt;VulnDiscussion&gt;Individual connectors can be configured to display the Tomcat information to clients. This information can be used to identif...
    Rule Medium Severity
  • SRG-APP-000141-AS-000095

    <GroupDescription></GroupDescription>
    Group
  • The vCenter STS service example applications must be removed.

    &lt;VulnDiscussion&gt;Tomcat provides example applications, documentation, and other directories in the default installation that do not serve a pr...
    Rule Medium Severity
  • SRG-APP-000141-AS-000095

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules