UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

VMware vSphere 7.0 vCenter Appliance RhttpProxy Security Technical Implementation Guide


Overview

Date Finding Count (8)
2023-02-21 CAT I (High): 0 CAT II (Med): 8 CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-256741 Medium The Envoy private key file must be protected from unauthorized access.
V-256740 Medium Envoy must use only Transport Layer Security (TLS) 1.2 for the protection of client connections.
V-256743 Medium Envoy (rhttpproxy) log files must be shipped via syslog to a central log server.
V-256742 Medium Envoy must exclusively use the HTTPS protocol for client connections.
V-256744 Medium Envoy log files must be shipped via syslog to a central log server.
V-256737 Medium Envoy must drop connections to disconnected clients.
V-256738 Medium Envoy must set a limit on established connections.
V-256739 Medium Envoy must be configured to operate in FIPS mode.