Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-72661 | VROM-CS-000140 | SV-87293r1_rule | Medium |
Description |
---|
The DoD standard for authentication is DoD-approved PKI certificates. Authentication based on User ID and Password may be used only when it is not possible to employ a PKI certificate, and requires AO approval. In such cases, passwords need to be protected at all times, and encryption is the standard method for protecting passwords during transmission. DBMS passwords sent in clear text format across the network are vulnerable to discovery by unauthorized users. Disclosure of passwords may easily lead to unauthorized access to the database. |
STIG | Date |
---|---|
vRealize - Cassandra Security Technical Implementation Guide | 2017-06-06 |
Check Text ( C-72817r1_chk ) |
---|
Review configuration settings for encrypting passwords in transit across the network. If passwords are not encrypted, this is a finding. At the command prompt, execute the following command: # grep '^\s*internode_encryption:' /usr/lib/vmware-vcops/user/conf/cassandra/cassandra.yaml If the line below is returned, this is a finding: internode_encryption: all |
Fix Text (F-79065r1_fix) |
---|
Configure encryption for transmission of passwords across the network. If the database does not provide encryption for logon events natively, employ encryption at the OS or network level. At the command line execute the following command: # sed -i 's/^.*\binternode_encryption:.*$/internode_encryption: all/' /usr/lib/vmware-vcops/user/conf/cassandra/cassandra.yaml |