UCF STIG Viewer Logo

VMW vRealize Automation 7.x vIDM Security Technical Implementation Guide


Overview

Date Finding Count (7)
2018-10-12 CAT I (High): 2 CAT II (Med): 5 CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-90293 High vIDM, when installed in a MAC I system, must be in a high-availability (HA) cluster.
V-90287 High vIDM must utilize encryption when using LDAP for authentication.
V-90295 Medium The vRealize Automation appliance must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
V-90291 Medium vIDM must be configured to log activity to the horizon.log file.
V-90289 Medium vIDM must be configured to provide clustering.
V-90283 Medium vIDM must be configured to log activity to the horizon.log file.
V-90285 Medium vIDM must be configured correctly for the site enterprise user management system.