STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to VMware vRealize Automation 7.x tc Server Security Technical Implementation Guide

V-240805

CAT II (Medium)

tc Server ALL must only allow authenticated system administrators to have access to the keystore.

Rule ID

SV-240805r879613_rule

STIG

VMware vRealize Automation 7.x tc Server Security Technical Implementation Guide

Version

V2R3

CCIs

CCI-000186

Discussion

The web server's private key is used to prove the identity of the server to clients and securely exchange the shared secret key used to encrypt communications between the web server and clients. By gaining access to the private key, an attacker can pretend to be an authorized server and decrypt the SSL traffic between a client and the web server. tc Server stores the server's private key in a keystore file. The vRA keystore file is tcserver.keystore, and this file must be protected to only allow system administrators and other authorized users to have access to it.

Check Content

At the command prompt, execute the following command:

ls -al /opt/vmware/horizon/workspace/conf/tcserver.keystore

Verify that file permissions are set to "640" or more restrictive. Verify that the owner is horizon and group-owner is www.

If either of these conditions are not met, this is a finding.

Fix Text

At the command prompt, execute the following commands:

chown horizon:www /opt/vmware/horizon/workspace/conf/tcserver.keystore

chmod 640 /opt/vmware/horizon/workspace/conf/tcserver.keystore