I - Mission Critical Public
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000176-WSR-000096
Group -
The vCenter VAMI service must restrict access to the web server's private key.
The web server's private key is used to prove the identity of the server to clients and securely exchange the shared secret key used to encrypt communications between the web server and clients. By...Rule Medium Severity -
SRG-APP-000179-WSR-000111
Group -
The vCenter VAMI service must enable FIPS mode.
Encryption is only as good as the encryption modules used. Unapproved cryptographic module algorithms cannot be verified and cannot be relied on to provide confidentiality or integrity, and DOD dat...Rule High Severity -
SRG-APP-000246-WSR-000149
Group -
The vCenter VAMI service must restrict the ability of users to launch Denial of Service (DoS) attacks against other information systems or networks.
In UNIX and related computer operating systems, a file descriptor is an indicator used to access a file or other input/output resource, such as a pipe or network connection. File descriptors index ...Rule Medium Severity -
SRG-APP-000251-WSR-000157
Group -
The vCenter VAMI service must set the encoding for all text mime types to UTF-8.
Invalid user input occurs when a user inserts data or characters into a hosted application's data entry field and the hosted application is unprepared to process that data. This results in unantici...Rule Medium Severity -
SRG-APP-000266-WSR-000142
Group -
The vCenter VAMI service must disable directory listing.
The goal is to completely control the web user's experience in navigating any portion of the web document root directories. Ensuring all web content directories have at least the equivalent of an "...Rule Medium Severity -
SRG-APP-000266-WSR-000159
Group -
The vCenter VAMI service must not be configured to use the "mod_status" module.
Any application providing too much information in error logs and in administrative messages to the screen risks compromising the data and security of the application and system. VAMI must only gen...Rule Medium Severity -
SRG-APP-000266-WSR-000160
Group -
The vCenter VAMI service must have debug logging disabled.
Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information about the web server and plug-ins or modules being used. When debugging or t...Rule Medium Severity -
SRG-APP-000516-WSR-000174
Group -
The vCenter VAMI service must enable honoring the SSL cipher order.
During a Transport Layer Security (TLS) session negotiation, when choosing a cipher during a handshake, normally the client's preference is used. This is potentially problematic as a malicious, dat...Rule Medium Severity -
SRG-APP-000516-WSR-000174
Group -
The vCenter VAMI service must disable client initiated TLS renegotiation.
All versions of the Secure Sockets Layer (SSL) and TLS protocols (up to and including TLS 1.2) are vulnerable to a man-in-the-middle attack (CVE-2009-3555) during a renegotiation. This vulnerabilit...Rule Medium Severity -
SRG-APP-000516-WSR-000174
Group -
The vCenter VAMI service must be configured to hide the server type and version in client responses.
Web servers will often display error messages to client users, displaying enough information to aid in the debugging of the error. The information given back in error messages may display the web s...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.