UCF STIG Viewer Logo

VMware vRealize Automation 7.x Lighttpd Security Technical Implementation Guide


Overview

Date Finding Count (62)
2023-09-12 CAT I (High): 7 CAT II (Med): 55 CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-240239 High Lighttpd must only contain components that are operationally necessary.
V-258452 High The version of vRealize Automation 7.x Lighttpd running on the system must be a supported version.
V-240246 High Lighttpd must not use symbolic links in the Lighttpd web content directory tree.
V-240271 High Lighttpd must use an approved TLS version for encryption.
V-240258 High Lighttpd must be configured to utilize the Common Information Model Object Manager.
V-240251 High Lighttpd must prohibit non-privileged accounts from accessing the directory tree, the shell, or other operating system functions and utilities.
V-240252 High Lighttpd must have the latest version installed.
V-240236 Medium Lighttpd expansion modules must be verified for their integrity before being added to a production web server.
V-240237 Medium Lighttpd must prohibit unnecessary services, functions or processes.
V-240234 Medium Lighttpd log data and records must be backed up onto a different system or media.
V-240235 Medium Lighttpd files must be verified for their integrity before being added to a production web server.
V-240232 Medium Lighttpd must have the correct group-ownership on the log files to ensure they are protected from unauthorized deletion.
V-240215 Medium Lighttpd must limit the number of simultaneous requests.
V-240230 Medium Lighttpd must have the correct permissions on the log files to ensure they are protected from unauthorized modification.
V-240217 Medium Lighttpd must be configured to use the SSL engine.
V-240218 Medium Lighttpd must be configured to use mod_accesslog.
V-240219 Medium Lighttpd must generate log records for system startup and shutdown.
V-240238 Medium Lighttpd proxy settings must be configured.
V-240233 Medium Lighttpd must have the correct permissions on the log files to ensure they are protected from unauthorized deletion.
V-240265 Medium Lighttpd must prohibit non-privileged accounts from accessing the application, libraries, and configuration files.
V-240216 Medium Lighttpd must be configured with FIPS 140-2 compliant ciphers for https connections.
V-240228 Medium Lighttpd must have the correct ownership on the log files to ensure they are protected from unauthorized modification.
V-240231 Medium Lighttpd must have the correct ownership on the log files to ensure they are protected from unauthorized deletion.
V-240243 Medium Lighttpd must not have the Web Distributed Authoring (WebDAV) module installed.
V-240229 Medium Lighttpd must have the correct group-ownership on the log files to ensure they are protected from unauthorized modification.
V-240264 Medium Lighttpd must record time stamps for log records to a minimum granularity of time.
V-240267 Medium Lighttpd must be configured with FIPS 140-2 compliant ciphers for https connections.
V-240266 Medium Lighttpd must not be configured to listen to unnecessary ports.
V-240261 Medium Lighttpd must be configured to use syslog.
V-240260 Medium Lighttpd must be configured to use syslog.
V-240249 Medium Lighttpd must have private key access restricted.
V-240248 Medium Lighttpd must use SSL/TLS protocols in order to secure passwords during transmission from the client.
V-240221 Medium Lighttpd must produce log records containing sufficient information to establish when (date and time) events occurred.
V-240220 Medium Lighttpd must produce log records containing sufficient information to establish what type of events occurred.
V-240223 Medium Lighttpd must produce log records containing sufficient information to establish the source of events.
V-240222 Medium Lighttpd must produce log records containing sufficient information to establish where within the web server the events occurred.
V-240225 Medium Lighttpd must have the correct ownership on the log files to ensure they are only be accessible by privileged users.
V-240224 Medium Lighttpd must produce log records containing sufficient information to establish the outcome (success or failure) of events.
V-240227 Medium Lighttpd must have the correct permissions on the log files to ensure they are only be accessible by privileged users.
V-240226 Medium Lighttpd must have the correct group-ownership on the log files to ensure they are only be accessible by privileged users.
V-240263 Medium Lighttpd audit records must be mapped to a time stamp.
V-240262 Medium The web server must use a logging mechanism that is configured to provide a warning to the ISSO and SA when allocated record storage volume reaches 75% of maximum log record storage capacity.
V-240247 Medium Lighttpd must be configured to use port 5480.
V-240253 Medium The Lighttpd baseline must be maintained.
V-240273 Medium Lighttpd must be configured to use SSL.
V-240245 Medium Lighttpd must prevent hosted applications from exhausting system resources.
V-240244 Medium Lighttpd must not have the webdav configuration file included.
V-240269 Medium Lighttpd must be configured to use the SSL engine.
V-240241 Medium Lighttpd must only enable mappings to necessary and approved scripts.
V-240242 Medium Lighttpd must have resource mappings set to disable the serving of certain file types.
V-240272 Medium Lighttpd must remove all export ciphers to transmitted information.
V-240268 Medium Lighttpd must be protected from being stopped by a non-privileged user.
V-240270 Medium Lighttpd must be configured to use the SSL engine.
V-240259 Medium Lighttpd must restrict inbound connections from nonsecure zones.
V-240274 Medium Lighttpd must have the latest approved security-relevant software updates installed.
V-240275 Medium Lighttpd must disable IP forwarding.
V-240254 Medium Lighttpd must protect against or limit the effects of HTTP types of Denial of Service (DoS) attacks.
V-240255 Medium Lighttpd must disable directory browsing.
V-240256 Medium Lighttpd must not be configured to use mod_status.
V-240257 Medium Lighttpd must have debug logging disabled.
V-240250 Medium Lighttpd must be configured to use only FIPS 140-2 approved ciphers.
V-240240 Medium Lighttpd must have MIME types for csh or sh shell programs disabled.