III - Administrative Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000001-WSR-000001
Group -
ESX Agent Manager must limit the amount of time that each Transmission Control Protocol (TCP) connection is kept alive.
Denial of service (DoS) is one threat against web servers. Many DoS attacks attempt to consume web server resources in such a way that no more resources are available to satisfy legitimate requests...Rule Medium Severity -
SRG-APP-000001-WSR-000001
Group -
ESX Agent Manager must limit the number of concurrent connections permitted.
Resource exhaustion can occur when an unlimited number of concurrent requests are allowed on a website, facilitating a denial-of-service attack. Unless the number of requests is controlled, the web...Rule Medium Severity -
SRG-APP-000001-WSR-000001
Group -
ESX Agent Manager must limit the maximum size of a POST request.
The "maxPostSize" value is the maximum size in bytes of the POST that will be handled by the container FORM URL parameter parsing. Limit its size to reduce exposure to a denial-of-service attack. I...Rule Medium Severity -
SRG-APP-000001-WSR-000002
Group -
ESX Agent Manager must protect cookies from cross-site scripting (XSS).
Cookies are a common way to save session state over the HTTP(S) protocol. If attackers can compromise session data stored in a cookie, they are better able to launch an attack against the server an...Rule Medium Severity -
SRG-APP-000016-WSR-000005
Group -
ESX Agent Manager must record user access in a format that enables monitoring of remote access.
Remote access can be exploited by an attacker to compromise the server. By recording all remote access activities, it will be possible to determine the attacker's location, intent, and degree of su...Rule Medium Severity -
SRG-APP-000089-WSR-000047
Group -
ESX Agent Manager must generate log records for system startup and shutdown.
Logging must be started as soon as possible when a service starts and as late as possible when a service is stopped. Many forms of suspicious actions can be detected by analyzing logs for unexpecte...Rule Medium Severity -
SRG-APP-000119-WSR-000069
Group -
ESX Agent Manager log files must only be modifiable by privileged users.
Log data is essential in the investigation of events. The accuracy of the information is always pertinent. One of the first steps an attacker will take is the modification or deletion of log record...Rule Medium Severity -
SRG-APP-000131-WSR-000051
Group -
ESX Agent Manager application files must be verified for their integrity.
Verifying that ESX Agent Manager application code is unchanged from its shipping state is essential for file validation and nonrepudiation of the ESX Agent Manager. There is no reason the MD5 hash ...Rule Medium Severity -
SRG-APP-000131-WSR-000073
Group -
ESX Agent Manager must only run one webapp.
VMware ships ESX Agent Managers on the vCenter Server Appliance (VCSA) with one webapp. Any other path is potentially malicious and must be removed. Satisfies: SRG-APP-000131-WSR-000073, SRG-APP-0...Rule Medium Severity -
SRG-APP-000141-WSR-000015
Group -
ESX Agent Manager must not be configured with unsupported realms.
ESX Agent Manager performs authentication at the application level and not through Tomcat. To eliminate unnecessary features and ensure ESX Agent Manager remains in its shipping state, the lack of ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.