UCF STIG Viewer Logo

The vRealize Automation appliance must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.


Overview

Finding ID Version Rule ID IA Controls Severity
V-89137 VRAU-AP-000655 SV-99787r1_rule Medium
Description
Configuring the vRealize Automation application to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security baseline across DoD that reflects the most restrictive security posture consistent with operational requirements. The vRA product is continually under refinement, and patches are regularly released to address vulnerabilities. As a result, the vRA STIG is also subject to a release cycle on a quarterly basis. Assessors should ensure that they are reviewing the vRealize Automation appliance with the most current STIG.
STIG Date
VMware Automation 7.x Application Security Technical Implementation Guide 2018-10-12

Details

Check Text ( C-88829r1_chk )
Obtain the current vRealize Automation STIGs from the ISSO.

Verify that this STIG is the most current STIG available for vRealize Automation. Assess all of the organization's vRA installations to ensure they are fully compliant with the most current STIG.

If the most current version of the vRA STIG was not used, or if the vRA appliance configuration is not compliant with the most current STIG, this is a finding.
Fix Text (F-95879r1_fix)
Obtain the most current vRealize Automation STIG. Verify that this vRA appliance is configured with all current requirements.