UCF STIG Viewer Logo

The vRealize Automation appliance must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.


Finding ID Version Rule ID IA Controls Severity
V-90295 VRAU-VI-000655 SV-100945r1_rule Medium
Configuring the vRealize Automation application to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security baseline across DoD that reflects the most restrictive security posture consistent with operational requirements. The vRA product is continually under refinement, and patches are regularly released to address vulnerabilities. As a result, the vRA STIG is also subject to a release cycle on a quarterly basis. Assessors should ensure that they are reviewing the vRealize Automation appliance with the most current STIG.
VMW vRealize Automation 7.x vIDM Security Technical Implementation Guide 2018-10-12


Check Text ( C-89987r1_chk )
Obtain the current vRealize Automation STIGs from the ISSO.

Verify that this STIG is the most current STIG available for vRealize Automation. Assess all of the organization's vRA installations to ensure that they are fully compliant with the most current STIG.

If the most current version of the vRA STIG was not used, or if the vRA appliance configuration is not compliant with the most current STIG, this is a finding.
Fix Text (F-97037r1_fix)
Obtain the most current vRealize Automation STIG. Verify that this vRA appliance is configured with all current requirements.