I - Mission Critical Public
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000266-WSR-000159
Group -
The vCenter VAMI service must not be configured to use the "mod_status" module.
Any application providing too much information in error logs and in administrative messages to the screen risks compromising the data and security of the application and system. VAMI must only gen...Rule Medium Severity -
SRG-APP-000266-WSR-000160
Group -
The vCenter VAMI service must have debug logging disabled.
Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information about the web server and plug-ins or modules being used. When debugging or t...Rule Medium Severity -
SRG-APP-000516-WSR-000174
Group -
The vCenter VAMI service must enable honoring the SSL cipher order.
During a Transport Layer Security (TLS) session negotiation, when choosing a cipher during a handshake, normally the client's preference is used. This is potentially problematic as a malicious, dat...Rule Medium Severity -
SRG-APP-000516-WSR-000174
Group -
The vCenter VAMI service must disable client initiated TLS renegotiation.
All versions of the Secure Sockets Layer (SSL) and TLS protocols (up to and including TLS 1.2) are vulnerable to a man-in-the-middle attack (CVE-2009-3555) during a renegotiation. This vulnerabilit...Rule Medium Severity -
SRG-APP-000516-WSR-000174
Group -
The vCenter VAMI service must be configured to hide the server type and version in client responses.
Web servers will often display error messages to client users, displaying enough information to aid in the debugging of the error. The information given back in error messages may display the web s...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.