STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to VMware vRealize Operations Manager 6.x tc Server Security Technical Implementation Guide

V-241658

CAT II (Medium)

tc Server ALL must only allow authenticated system administrators to have access to the keystore.

Rule ID

SV-241658r879613_rule

STIG

VMware vRealize Operations Manager 6.x tc Server Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-000186

Discussion

The web server's private key is used to prove the identity of the server to clients and securely exchange the shared secret key used to encrypt communications between the web server and clients. By gaining access to the private key, an attacker can pretend to be an authorized server and decrypt the SSL traffic between a client and the web server. tc Server stores the server's private key in a keystore file. The vROps keystore file is “tcserver.keystore”, and this file must be protected to only allow system administrators and other authorized users to have access to it.

Check Content

At the command prompt, execute the following command:

ls -al /storage/vcops/user/conf/ssl/tcserver.keystore

Verify that file permissions are set to “640” or more restrictive. 

Verify that the owner and group-owner are set to admin. If either of these conditions are not met, this is a finding.

Fix Text

At the command prompt, execute the following commands:

chown admin:admin /storage/vcops/user/conf/ssl/tcserver.keystore

chmod 640 /storage/vcops/user/conf/ssl/tcserver.keystore