STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to VMware vRealize Operations Manager 6.x tc Server Security Technical Implementation Guide

V-241665

CAT I (High)

tc Server API accounts accessing the directory tree, the shell, or other operating system functions and utilities must be administrative accounts.

Rule ID

SV-241665r879631_rule

STIG

VMware vRealize Operations Manager 6.x tc Server Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-001082

Discussion

As a rule, accounts on a web server are to be kept to a minimum. Only administrators, web managers, developers, auditors, and web authors require accounts on the machine hosting the web server. The resources to which these accounts have access must also be closely monitored and controlled. Only the system administrator needs access to all the system's capabilities, while the web administrator and associated staff require access and control of the web content and web server configuration files. As with all secure web server installations, tc Server files and directories must be adequately protected with correct permissions.

Check Content

Find any files that are not owned by admin or not group owned by admin, execute the following command:

cd /usr/lib/vmware-vcops/tomcat-enterprise

ls -alR bin conf | grep -E '^-' | awk '$3 !~ /admin/ {print}'

If the command produces any output, this is a finding.

Fix Text

At the command prompt, execute the following command:

Note: Replace <file_name> for the name of the file that was returned.

chown admin:admin <file_name>

Repeat the command for each file that was returned.