I - Mission Critical Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000001-WSR-000001
<GroupDescription></GroupDescription>Group -
The vCenter VAMI service must limit the number of allowed simultaneous session requests.
<VulnDiscussion>Denial of service (DoS) is one threat against web servers. Many DoS attacks attempt to consume web server resources in such a...Rule Medium Severity -
SRG-APP-000015-WSR-000014
<GroupDescription></GroupDescription>Group -
The vCenter VAMI service must use cryptography to protect the integrity of remote sessions.
<VulnDiscussion>Data exchanged between the user and the web server can range from static display data to credentials used to log in the hoste...Rule Medium Severity -
SRG-APP-000016-WSR-000005
<GroupDescription></GroupDescription>Group -
The vCenter VAMI service must generate information to monitor remote access.
<VulnDiscussion>Remote access can be exploited by an attacker to compromise the server. By recording all remote access activities, it will be...Rule Medium Severity -
SRG-APP-000095-WSR-000056
<GroupDescription></GroupDescription>Group -
The vCenter VAMI service must produce log records containing sufficient information to establish what type of events occurred.
<VulnDiscussion>Web server logging capability is critical for accurate forensic analysis. Without sufficient and accurate information, a corr...Rule Medium Severity -
SRG-APP-000118-WSR-000068
<GroupDescription></GroupDescription>Group -
The vCenter VAMI service log files must only be accessible by privileged users.
<VulnDiscussion>Log data is essential in the investigation of events. If log data were to become compromised, then competent forensic analysi...Rule Medium Severity -
SRG-APP-000125-WSR-000071
<GroupDescription></GroupDescription>Group -
The vCenter VAMI service must off-load log records onto a different system or media from the system being logged.
<VulnDiscussion>Protection of log data includes assuring log data is not accidentally lost or deleted. Backing up log records to an unrelated...Rule Medium Severity -
SRG-APP-000141-WSR-000081
<GroupDescription></GroupDescription>Group -
The vCenter VAMI service must explicitly disable Multipurpose Internet Mail Extensions (MIME) mime mappings based on "Content-Type".
<VulnDiscussion>Controlling what a user of a hosted application can access is part of the security posture of the web server. Any time a user...Rule Medium Severity -
SRG-APP-000141-WSR-000083
<GroupDescription></GroupDescription>Group -
The vCenter VAMI service must have resource mappings set to disable the serving of certain file types.
<VulnDiscussion>Resource mapping is the process of tying a particular file type to a process in the web server that can serve that type of fi...Rule Medium Severity -
SRG-APP-000141-WSR-000085
<GroupDescription></GroupDescription>Group -
The vCenter VAMI service must have Web Distributed Authoring (WebDAV) disabled.
<VulnDiscussion>A web server can be installed with functionality that, by its nature, is not secure. WebDAV is an extension to the HTTP proto...Rule Medium Severity -
SRG-APP-000141-WSR-000086
<GroupDescription></GroupDescription>Group -
The vCenter VAMI service must protect system resources and privileged operations from hosted applications.
<VulnDiscussion>Most of the attention to denial-of-service (DoS) attacks focuses on ensuring that systems and applications are not victims of...Rule Medium Severity -
SRG-APP-000176-WSR-000096
<GroupDescription></GroupDescription>Group -
The vCenter VAMI service must restrict access to the web server's private key.
<VulnDiscussion>The web server's private key is used to prove the identity of the server to clients and securely exchange the shared secret k...Rule Medium Severity -
SRG-APP-000179-WSR-000111
<GroupDescription></GroupDescription>Group -
The vCenter VAMI service must enable FIPS mode.
<VulnDiscussion>Encryption is only as good as the encryption modules used. Unapproved cryptographic module algorithms cannot be verified and ...Rule High Severity -
SRG-APP-000246-WSR-000149
<GroupDescription></GroupDescription>Group -
The vCenter VAMI service must restrict the ability of users to launch Denial of Service (DoS) attacks against other information systems or networks.
<VulnDiscussion>In UNIX and related computer operating systems, a file descriptor is an indicator used to access a file or other input/output...Rule Medium Severity -
SRG-APP-000251-WSR-000157
<GroupDescription></GroupDescription>Group -
The vCenter VAMI service must set the encoding for all text mime types to UTF-8.
<VulnDiscussion>Invalid user input occurs when a user inserts data or characters into a hosted application's data entry field and the hosted ...Rule Medium Severity -
SRG-APP-000266-WSR-000142
<GroupDescription></GroupDescription>Group -
The vCenter VAMI service must disable directory listing.
<VulnDiscussion>The goal is to completely control the web user's experience in navigating any portion of the web document root directories. E...Rule Medium Severity -
SRG-APP-000266-WSR-000159
<GroupDescription></GroupDescription>Group -
The vCenter VAMI service must not be configured to use the "mod_status" module.
<VulnDiscussion>Any application providing too much information in error logs and in administrative messages to the screen risks compromising ...Rule Medium Severity -
SRG-APP-000266-WSR-000160
<GroupDescription></GroupDescription>Group -
The vCenter VAMI service must have debug logging disabled.
<VulnDiscussion>Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information abou...Rule Medium Severity -
SRG-APP-000516-WSR-000174
<GroupDescription></GroupDescription>Group -
The vCenter VAMI service must enable honoring the SSL cipher order.
<VulnDiscussion>During a Transport Layer Security (TLS) session negotiation, when choosing a cipher during a handshake, normally the client's...Rule Medium Severity -
SRG-APP-000516-WSR-000174
<GroupDescription></GroupDescription>Group -
The vCenter VAMI service must disable client initiated TLS renegotiation.
<VulnDiscussion>All versions of the Secure Sockets Layer (SSL) and TLS protocols (up to and including TLS 1.2) are vulnerable to a man-in-the...Rule Medium Severity -
SRG-APP-000516-WSR-000174
<GroupDescription></GroupDescription>Group -
The vCenter VAMI service must be configured to hide the server type and version in client responses.
<VulnDiscussion>Web servers will often display error messages to client users, displaying enough information to aid in the debugging of the e...Rule Medium Severity -
SRG-APP-000516-WSR-000174
<GroupDescription></GroupDescription>Group -
The vCenter VAMI service must implement HTTP Strict Transport Security (HSTS).
<VulnDiscussion>HSTS instructs web browsers to only use secure connections for all future requests when communicating with a website. Doing s...Rule Medium Severity -
SRG-APP-000516-WSR-000174
<GroupDescription></GroupDescription>Group -
The vCenter VAMI service must implement prevent rendering inside a frame or iframe on another site.
<VulnDiscussion>Clickjacking, also known as a “UI redress attack”, is when an attacker uses multiple transparent or opaque layers to trick a ...Rule Medium Severity -
SRG-APP-000516-WSR-000174
<GroupDescription></GroupDescription>Group -
The vCenter VAMI service must protect against MIME sniffing.
<VulnDiscussion>MIME sniffing was, and still is, a technique used by some web browsers to examine the content of a particular asset. This is ...Rule Medium Severity -
SRG-APP-000516-WSR-000174
<GroupDescription></GroupDescription>Group -
The vCenter VAMI service must enable Content Security Policy.
<VulnDiscussion>A Content Security Policy (CSP) requires careful tuning and precise definition of the policy. If enabled, CSP has significant...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.