|The rhttpproxy must set a limit on established connections.
|The rhttpproxy client connections must be limited to preserve system resources and continue servicing connections without interruption. Without a limit set, the system would be vulnerable to a...
|The rhttpproxy must drop connections to disconnected clients.
|The rhttpproxy client connections that are established but no longer connected can consume resources that might otherwise be required by active connections. It is a best practice to terminate...
|The rhttpproxy must use cryptography to protect the integrity of remote sessions.
|The rhttpproxy can be configured to support TLS 1.0, 1.1 and 1.2. Due to intrinsic problems in TLS 1.0 and TLS 1.1, they are disabled by default. The <protocol> block in the rhttproxy...
|The rhttpproxy must be configured to operate solely with FIPS ciphers.
|The rhttpproxy ships with FIPS 140-2 validated OpenSSL cryptographic libraries and is configured by default to run in FIPS mode. This module is used for all crypto operations performed by...
|The rhttpproxy private key file must be protected from unauthorized access.
|The rhttpproxy's private key is used to prove the identity of the server to clients and securely exchange the shared secret key used to encrypt communications between the web server and...
|The rhttproxy must exclusively use the HTTPS protocol for client connections.
|Remotely accessing vCenter via the rhttpproxy involves sensitive information going over the wire. To protect the confidentiality and integrity of these communications, the rhttpproxy must be...
|The rhttpproxy log files must be moved to a permanent repository in accordance with site policy.
|The rhttpproxy produces a handful of logs that must be offloaded from the originating system. This information can then be used for diagnostic, forensic, or other purposes relevant to ensuring the...
|The rhttpproxy must produce log records containing sufficient information to establish the source of events.
|After a security incident has occurred, investigators will often review log files to determine what happened, and determining the source of an event is crucial for forensics. The rhttpproxy must...
|The rhttpproxy must have logging enabled.
|After a security incident has occurred, investigators will often review log files to determine what happened. The rhttpproxy must create logs upon service startup to capture information relevant...