STIGQter STIGQter: STIG Summary: VMware vRealize Automation 7.x Lighttpd Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 28 Sep 2018:

Lighttpd must be protected from being stopped by a non-privileged user.

DISA Rule

SV-99961r1_rule

Vulnerability Number

V-89311

Group Title

SRG-APP-000435-WSR-000147

Rule Version

VRAU-LI-000450

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Note: The following command must be ran as root.

At the command prompt, execute the following command:

/opt/vmware/etc/init.d/vami-lighttpd restart

Check Contents

At the command prompt, execute the following command:

ps -f -U root | awk '$0 ~ /vami-lighttpd/ && $0 !~ /awk/ {print}'

If the "vami-lighttpd" process is not owned by "root", this is a finding.

Vulnerability Number

V-89311

Documentable

False

Rule Version

VRAU-LI-000450

Severity Override Guidance

At the command prompt, execute the following command:

ps -f -U root | awk '$0 ~ /vami-lighttpd/ && $0 !~ /awk/ {print}'

If the "vami-lighttpd" process is not owned by "root", this is a finding.

Check Content Reference

M

Target Key

3457

Comments