Skip to content

II - Mission Support Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000001-WSR-000001

    <GroupDescription></GroupDescription>
    Group
  • vSphere UI must limit the number of concurrent connections permitted.

    &lt;VulnDiscussion&gt;Resource exhaustion can occur when an unlimited number of concurrent requests are allowed on a website, facilitating a denial...
    Rule Medium Severity
  • SRG-APP-000001-WSR-000001

    <GroupDescription></GroupDescription>
    Group
  • vSphere UI must limit the maximum size of a POST request.

    &lt;VulnDiscussion&gt;The "maxPostSize" value is the maximum size in bytes of the POST which will be handled by the container FORM URL parameter pa...
    Rule Medium Severity
  • SRG-APP-000001-WSR-000002

    <GroupDescription></GroupDescription>
    Group
  • vSphere UI must protect cookies from cross-site scripting (XSS).

    &lt;VulnDiscussion&gt;Cookies are a common way to save session state over the HTTP(S) protocol. If an attacker can compromise session data stored i...
    Rule Medium Severity
  • SRG-APP-000016-WSR-000005

    <GroupDescription></GroupDescription>
    Group
  • vSphere UI must record user access in a format that enables monitoring of remote access.

    &lt;VulnDiscussion&gt;Remote access can be exploited by an attacker to compromise the server. By recording all remote access activities, it will be...
    Rule Medium Severity
  • SRG-APP-000089-WSR-000047

    <GroupDescription></GroupDescription>
    Group
  • vSphere UI must generate log records for system startup and shutdown.

    &lt;VulnDiscussion&gt;Logging must be started as soon as possible when a service starts and when a service is stopped. Many forms of suspicious act...
    Rule Medium Severity
  • SRG-APP-000118-WSR-000068

    <GroupDescription></GroupDescription>
    Group
  • vSphere UI log files must only be accessible by privileged users.

    &lt;VulnDiscussion&gt;Log data is essential in the investigation of events. If log data were to become compromised, competent forensic analysis and...
    Rule Medium Severity
  • SRG-APP-000131-WSR-000051

    <GroupDescription></GroupDescription>
    Group
  • vSphere UI application files must be verified for their integrity.

    &lt;VulnDiscussion&gt;Verifying the vSphere UI application code is unchanged from its shipping state is essential for file validation and nonrepudi...
    Rule Medium Severity
  • SRG-APP-000131-WSR-000073

    <GroupDescription></GroupDescription>
    Group
  • vSphere UI plugins must be authorized before use.

    &lt;VulnDiscussion&gt;The vSphere UI ships with a number of plugins out of the box. Any additional plugins may affect the availability and integrit...
    Rule Medium Severity
  • SRG-APP-000141-WSR-000015

    <GroupDescription></GroupDescription>
    Group
  • vSphere UI must not be configured with the "UserDatabaseRealm" enabled.

    &lt;VulnDiscussion&gt;The vSphere UI performs user authentication at the application level and not through Tomcat. By default, there is no configur...
    Rule Medium Severity
  • SRG-APP-000141-WSR-000075

    <GroupDescription></GroupDescription>
    Group
  • vSphere UI must be configured to limit access to internal packages.

    &lt;VulnDiscussion&gt;The "package.access" entry in the "catalina.properties" file implements access control at the package level. When properly co...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules