STIGQter STIGQter: STIG Summary: VMware vRealize Automation 7.x tc Server Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 28 Sep 2018:

tc Server VCAC log files must be protected from unauthorized modification.

DISA Rule

SV-100637r1_rule

Vulnerability Number

V-89987

Group Title

SRG-APP-000119-WSR-000069

Rule Version

VRAU-TC-000285

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

At the command prompt, execute the following command:

Set the owner & group of these files: access_log.txt, audit.log, catalina.log, catalina.out, gc_logs.log.0.current, host-manager.log, localhost.log, manager.log, and tomcat.pid to vcac, with the following command:

chown vcac:vcac /storage/log/vmware/vcac/<file>

Set all other files not listed above to the owner and group of root, with the following command:

chown root:root /storage/log/vmware/vcac/<file>

Note: Substitute <file> with the listed file.

Check Contents

At the command prompt, execute the following command:

ls -lL /storage/log/vmware/vcac

If any log files are not owned by "root" or "vcac", this is a finding.

Vulnerability Number

V-89987

Documentable

False

Rule Version

VRAU-TC-000285

Severity Override Guidance

At the command prompt, execute the following command:

ls -lL /storage/log/vmware/vcac

If any log files are not owned by "root" or "vcac", this is a finding.

Check Content Reference

M

Target Key

3439

Comments