UCF STIG Viewer Logo

tc Server VCAC must be configured with FIPS 140-2 compliant ciphers for HTTPS connections.


Finding ID Version Rule ID IA Controls Severity
V-240738 VRAU-TC-000070 SV-240738r879519_rule Medium
Encryption of data-in-flight is an essential element of protecting information confidentiality. If a web server uses weak or outdated encryption algorithms, then the server's communications can potentially be compromised. The US Federal Information Processing Standards (FIPS) publication 140-2, Security Requirements for Cryptographic Modules (FIPS 140-2) identifies eleven areas for a cryptographic module used inside a security system that protects information. FIPS 140-2 approved ciphers provide the maximum level of encryption possible for a private web server. Configuration of ciphers used by tc Server are set in the catalina.properties file. Only those ciphers specified in the configuration file, and which are available in the installed OpenSSL library, will be used by tc Server while encrypting data for transmission.
VMware vRealize Automation 7.x tc Server Security Technical Implementation Guide 2023-10-03


Check Text ( C-43971r674393_chk )
At the command prompt, execute the following command:

grep cipher /etc/vcac/catalina.properties

If the value of "cipher" does not match the list of FIPS 140-2 ciphers or is missing, this is a finding.

Note: To view a list of FIPS 140-2 ciphers, at the command prompt execute the following command:

openssl ciphers 'FIPS'
Fix Text (F-43930r673957_fix)
Navigate to and open /etc/vcac/catalina.properties.

Navigate to and locate "cipher".

Configure the "cipher" with FIPS 140-2 compliant ciphers.