UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

tc Server ALL must only allow authenticated system administrators to have access to the keystore.


Overview

Finding ID Version Rule ID IA Controls Severity
V-88951 VROM-TC-000465 SV-99601r1_rule Medium
Description
The web server's private key is used to prove the identity of the server to clients and securely exchange the shared secret key used to encrypt communications between the web server and clients. By gaining access to the private key, an attacker can pretend to be an authorized server and decrypt the SSL traffic between a client and the web server. tc Server stores the server's private key in a keystore file. The vROps keystore file is “tcserver.keystore”, and this file must be protected to only allow system administrators and other authorized users to have access to it.
STIG Date
VMware vRealize Operations Manager 6.x tc Server Security Technical Implementation Guide 2018-10-12

Details

Check Text ( C-88643r1_chk )
At the command prompt, execute the following command:

ls -al /storage/vcops/user/conf/ssl/tcserver.keystore

Verify that file permissions are set to “640” or more restrictive.

Verify that the owner and group-owner are set to admin. If either of these conditions are not met, this is a finding.
Fix Text (F-95693r1_fix)
At the command prompt, execute the following commands:

chown admin:admin /storage/vcops/user/conf/ssl/tcserver.keystore

chmod 640 /storage/vcops/user/conf/ssl/tcserver.keystore