UCF STIG Viewer Logo

VMware vRealize Automation 7.x vIDM Security Technical Implementation Guide


Date Finding Count (8)
2023-09-12 CAT I (High): 3 CAT II (Med): 5 CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles

Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-240974 High vIDM, when installed in a MAC I system, must be in a high-availability (HA) cluster.
V-240971 High vIDM must utilize encryption when using LDAP for authentication.
V-258456 High The version of vRealize Automation 7.x vIDM running on the system must be a supported version.
V-240975 Medium The vRealize Automation appliance must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
V-240970 Medium vIDM must be configured correctly for the site enterprise user management system.
V-240973 Medium vIDM must be configured to log activity to the horizon.log file.
V-240972 Medium vIDM must be configured to provide clustering.
V-240969 Medium vIDM must be configured to log activity to the horizon.log file.