STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to VMware vRealize Operations Manager 6.x tc Server Security Technical Implementation Guide

V-241666

CAT I (High)

tc Server UI web server application directories must not be accessible to anonymous user.

Rule ID

SV-241666r879631_rule

STIG

VMware vRealize Operations Manager 6.x tc Server Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-001082

Discussion

In order to properly monitor the changes to the web server and the hosted applications, logging must be enabled. Along with logging being enabled, each record must properly contain the changes made and the names of those who made the changes. Allowing anonymous users the capability to change the web server or the hosted application will not generate proper log information that can then be used for forensic reporting in the case of a security issue. Allowing anonymous users to make changes will also grant change capabilities to anybody without forcing a user to authenticate before the changes can be made.

Check Content

At the command prompt, execute the following commands:

cd /usr/lib/vmware-vcops/tomcat-web-app

ls -alR bin lib conf | grep -E '^-' | awk '$1 !~ /---$/ {print}'

If the command produces any output, this is a finding.

Fix Text

At the command prompt, execute the following command:

Note: Replace <file_name> for the name of the file that was returned.

If the file was found in /bin or /lib, execute the following command:

chmod 700 <file_name>

If the file was found in /conf, execute the following command:

chmod 600 <file_name>

Repeat the command for each file that was returned.