STIGQter STIGQter: STIG Summary: VMware vSphere 6.7 VAMI-lighttpd Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 09 Mar 2021:

VAMI configuration files must be protected from unauthorized access.

DISA Rule

SV-239739r679327_rule

Vulnerability Number

V-239739

Group Title

SRG-APP-000380-WSR-000072

Rule Version

VCLD-67-000032

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

At the command prompt, enter the following command:

# chmod 644 <file>
# chown root:root <file>

Note: Replace <file> with every file returned from the command in the check.

Check Contents

At the command prompt, execute the following command:

# stat -c "%n permissions are %a and ownership is %U:%G" /opt/vmware/etc/lighttpd/lighttpd.conf /etc/applmgmt/appliance/lighttpd.conf

Expected result:

/opt/vmware/etc/lighttpd/lighttpd.conf permissions are 644 and ownership is root:root
/etc/applmgmt/appliance/lighttpd.conf permissions are 644 and ownership is root:root

If the output does not match the expected result, this is a finding.

Vulnerability Number

V-239739

Documentable

False

Rule Version

VCLD-67-000032

Severity Override Guidance

At the command prompt, execute the following command:

# stat -c "%n permissions are %a and ownership is %U:%G" /opt/vmware/etc/lighttpd/lighttpd.conf /etc/applmgmt/appliance/lighttpd.conf

Expected result:

/opt/vmware/etc/lighttpd/lighttpd.conf permissions are 644 and ownership is root:root
/etc/applmgmt/appliance/lighttpd.conf permissions are 644 and ownership is root:root

If the output does not match the expected result, this is a finding.

Check Content Reference

M

Target Key

5335

Comments