STIGQter STIGQter: STIG Summary: vRealize - Cassandra Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 05 Jun 2017:

The Cassandra Server must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.

DISA Rule

SV-87287r1_rule

Vulnerability Number

V-72655

Group Title

SRG-APP-000142-DB-000094

Rule Version

VROM-CS-000125

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Disable functions, ports, protocols, and services that are not part of https://disa.deps.mil/ext/cop/iase/ppsm/Pages/cal.aspx document, and as such are not approved.

Modify "native_transport_port" and "rpc_address" values in "cassandra.yaml" file, to set them in the approved range (refer to https://disa.deps.mil/ext/cop/iase/ppsm/Pages/cal.aspx document).

Check Contents

Obtain document containing the list of approved ports, protocols and services from https://disa.deps.mil/ext/cop/iase/ppsm/Pages/cal.aspx. Review the Cassandra Server database settings and local documentation for functions, ports, protocols, and services that are not approved.

Open the console to the server Cassandra DB is hosted at and type: "find / | grep "cassandra.yaml"". Open cassandra.yaml and review "native_transport_port" parameter value. Run "netstat -ntl | grep <"native_transport_port" parameter value >" command from the console on the host.

If protocol, port, and IP address Cassandra communicates on are not found in https://disa.deps.mil/ext/cop/iase/ppsm/Pages/cal.aspx, this is a finding.

Vulnerability Number

V-72655

Documentable

False

Rule Version

VROM-CS-000125

Severity Override Guidance

Obtain document containing the list of approved ports, protocols and services from https://disa.deps.mil/ext/cop/iase/ppsm/Pages/cal.aspx. Review the Cassandra Server database settings and local documentation for functions, ports, protocols, and services that are not approved.

Open the console to the server Cassandra DB is hosted at and type: "find / | grep "cassandra.yaml"". Open cassandra.yaml and review "native_transport_port" parameter value. Run "netstat -ntl | grep <"native_transport_port" parameter value >" command from the console on the host.

If protocol, port, and IP address Cassandra communicates on are not found in https://disa.deps.mil/ext/cop/iase/ppsm/Pages/cal.aspx, this is a finding.

Check Content Reference

M

Target Key

3179

Comments