STIGQter STIGQter: STIG Summary: VMware vRealize Automation 7.x tc Server Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 28 Sep 2018:

tc Server VCAC accounts accessing the directory tree, the shell, or other operating system functions and utilities must be administrative accounts.

DISA Rule

SV-100701r1_rule

Vulnerability Number

V-90051

Group Title

SRG-APP-000211-WSR-000030

Rule Version

VRAU-TC-000485

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

At the command prompt, execute the following command:

If the file was found in /etc/vcac or /usr/lib/vcac/server/webapps, execute the following command:

chown vcac:vcac <file_name>

Note: Replace <file_name> for the name of the file that was returned.

Check Contents

At the command prompt, execute the following command:

ls -alR /etc/vcac /usr/lib/vcac/server/webapps | grep -E '^-' | awk '$3 !~ /vcac|root/ {print}'

If the command produces any output, this is a finding.

Vulnerability Number

V-90051

Documentable

False

Rule Version

VRAU-TC-000485

Severity Override Guidance

At the command prompt, execute the following command:

ls -alR /etc/vcac /usr/lib/vcac/server/webapps | grep -E '^-' | awk '$3 !~ /vcac|root/ {print}'

If the command produces any output, this is a finding.

Check Content Reference

M

Target Key

3439

Comments