UCF STIG Viewer Logo

SSMC web server must use encryption strength in accordance with the categorization of data hosted by the web server when remote connections are provided.


Overview

Finding ID Version Rule ID IA Controls Severity
V-255253 SSMC-WS-010040 SV-255253r879519_rule High
Description
The SSMC web server has several remote communications channels. Examples are user requests via http/https, communication to a backend database, or communication to authenticate users. The encryption used to communicate must match the data that is being retrieved or presented. Methods of communication are http for publicly displayed information, https to encrypt when user data is being transmitted, VPN tunneling, or other encryption methods to a database. Satisfies: SRG-APP-000014-WSR-000006, SRG-APP-000172-WSR-000104, SRG-APP-000439-WSR-000151, SRG-APP-000439-WSR-000156, SRG-APP-000441-WSR-000181, SRG-APP-000442-WSR-000182
STIG Date
HPE 3PAR SSMC Web Server Security Technical Implementation Guide 2023-05-17

Details

Check Text ( C-58866r869926_chk )
Verify that SSMC uses encryption strength equal to the categorization of data hosted by doing the following:

1. Log on to SSH as ssmcadmin. Press "X" to escape to general bash shell.

2. Execute the following:

$ grep ^ssmc.secure.tls.only /opt/hpe/ssmc/ssmcbase/resources/ssmc.properties
ssmc.secure.tls.only = true

If the command output does not read "ssmc.secure.tls.only = true", this is a finding.
Fix Text (F-58810r869927_fix)
Configure SSMC to use encryption strength equal to the categorization of data hosted by doing the following:

1. Log on to SSH as ssmcadmin. Press "X" to escape to general bash shell.

2. Using vi edit ssmc.properties and set "ssmc.secure.tls.only=true". Save and exit.

3. Type "config_appliance" to return to TUI. Restart (stop and start) SSMC services using TUI menu option 2.