STIGQter STIGQter: STIG Summary: VMware vSphere 6.7 VAMI-lighttpd Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 09 Mar 2021:

VAMI must use cryptography to protect the integrity of remote sessions.

DISA Rule

SV-239717r679261_rule

Vulnerability Number

V-239717

Group Title

SRG-APP-000015-WSR-000014

Rule Version

VCLD-67-000003

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf.

Add or reconfigure the following value:

ssl.engine = "enable"

Check Contents

At the command prompt, execute the following command:

# /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|grep "ssl.engine"

Expected result:

ssl.engine = "enable"

If the output does not match the expected result, this is a finding.

Vulnerability Number

V-239717

Documentable

False

Rule Version

VCLD-67-000003

Severity Override Guidance

At the command prompt, execute the following command:

# /opt/vmware/sbin/vami-lighttpd -p -f /opt/vmware/etc/lighttpd/lighttpd.conf|grep "ssl.engine"

Expected result:

ssl.engine = "enable"

If the output does not match the expected result, this is a finding.

Check Content Reference

M

Target Key

5335

Comments