UCF STIG Viewer Logo

VMware vRealize Operations Manager 6.x Application Security Technical Implementation Guide


Date Finding Count (5)
2018-10-11 CAT I (High): 0 CAT II (Med): 5 CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles

Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-88213 Medium The vRealize Operations appliance must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
V-88209 Medium The vRealize Operations server must be configured to perform complete application deployments.
V-88211 Medium The vRealize Operations server must only allow the use of DoD PKI-established certificate authorities for verification of the establishment of protected sessions.
V-88205 Medium The vRealize Operations server must use an enterprise user management system to uniquely identify and authenticate users (or processes acting on behalf of organizational users).
V-88207 Medium The vRealize Operations server session timeout must be configured.