STIGQter STIGQter: STIG Summary: VMware vRealize Automation 7.x SLES Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 28 Sep 2018:

The SLES for vRealize must employ strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions.

DISA Rule

SV-100361r1_rule

Vulnerability Number

V-89711

Group Title

SRG-OS-000125-GPOS-00065

Rule Version

VRAU-SL-000760

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Update the "Ciphers" directive with the following command:

# sed -i "/^[^#]*Ciphers/ c\Ciphers aes256-ctr,aes128-ctr" /etc/ssh/sshd_config

Save and close the file.

Restart the sshd process:

# service sshd restart

Check Contents

Check the SSH daemon configuration for DoD-approved encryption to protect the confidentiality of SSH remote connections by performing the following commands:

Check the "Ciphers" setting in the "sshd_config" file.

# grep -i Ciphers /etc/ssh/sshd_config | grep -v '#'

The output must contain either nothing or any number of the following algorithms:

aes128-ctr, aes256-ctr.

If the output contains an algorithm not listed above, this is a finding.

Expected Output:
Ciphers aes256-ctr,aes128-ctr

Vulnerability Number

V-89711

Documentable

False

Rule Version

VRAU-SL-000760

Severity Override Guidance

Check the SSH daemon configuration for DoD-approved encryption to protect the confidentiality of SSH remote connections by performing the following commands:

Check the "Ciphers" setting in the "sshd_config" file.

# grep -i Ciphers /etc/ssh/sshd_config | grep -v '#'

The output must contain either nothing or any number of the following algorithms:

aes128-ctr, aes256-ctr.

If the output contains an algorithm not listed above, this is a finding.

Expected Output:
Ciphers aes256-ctr,aes128-ctr

Check Content Reference

M

Target Key

3459

Comments