STIGQter STIGQter: STIG Summary: VMW vRealize Automation 7.x vAMI Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 28 Sep 2018:

The vAMI must protect log information from unauthorized deletion.

DISA Rule

SV-100857r1_rule

Vulnerability Number

V-90207

Group Title

SRG-APP-000120-AS-000080

Rule Version

VRAU-VA-000140

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

At the command prompt, enter the following command:

chown root:root </path/to/file>

Note: Replace </path/to/file> with the file(s) that are not owned by root.

Check Contents

At the command prompt, execute the following command:

ls -lL /opt/vmware/var/log/vami /opt/vmware/var/log/sfcb

If log files are not owned by root, this is a finding.

Vulnerability Number

V-90207

Documentable

False

Rule Version

VRAU-VA-000140

Severity Override Guidance

At the command prompt, execute the following command:

ls -lL /opt/vmware/var/log/vami /opt/vmware/var/log/sfcb

If log files are not owned by root, this is a finding.

Check Content Reference

M

Target Key

3449

Comments