STIGQter STIGQter: STIG Summary: VMware vSphere 6.7 VAMI-lighttpd Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 09 Mar 2021:

VAMI log files must only be accessible by privileged users.

DISA Rule

SV-239721r679273_rule

Vulnerability Number

V-239721

Group Title

SRG-APP-000118-WSR-000068

Rule Version

VCLD-67-000011

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

At the command prompt, enter the following command:

# chown root:root /opt/vmware/var/log/lighttpd/*.log
# chmod 640 /opt/vmware/var/log/lighttpd/*.log

Check Contents

At the command prompt, execute the following command:

# stat -c "%n has %a permissions and is owned by %U:%G" /opt/vmware/var/log/lighttpd/*.log

Expected result:

/opt/vmware/var/log/lighttpd/access.log has 644 permissions and is owned by root:root
/opt/vmware/var/log/lighttpd/error.log has 644 permissions and is owned by root:root

If the output does not match the expected result, this is a finding.

Vulnerability Number

V-239721

Documentable

False

Rule Version

VCLD-67-000011

Severity Override Guidance

At the command prompt, execute the following command:

# stat -c "%n has %a permissions and is owned by %U:%G" /opt/vmware/var/log/lighttpd/*.log

Expected result:

/opt/vmware/var/log/lighttpd/access.log has 644 permissions and is owned by root:root
/opt/vmware/var/log/lighttpd/error.log has 644 permissions and is owned by root:root

If the output does not match the expected result, this is a finding.

Check Content Reference

M

Target Key

5335

Comments