STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to VMware vRealize Automation 7.x vIDM Security Technical Implementation Guide

V-240972

CAT II (Medium)

vIDM must be configured to provide clustering.

Rule ID

SV-240972r879640_rule

STIG

VMware vRealize Automation 7.x vIDM Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-001190

Discussion

This requirement is dependent upon system MAC and confidentiality. If the system MAC and confidentiality levels do not specify redundancy requirements, this requirement is NA. Failure to a known secure state helps prevent a loss of confidentiality, integrity, or availability in the event of a failure of the information system or a component of the system. When application failure is encountered, preserving application state facilitates application restart and return to the operational mode of the organization with less disruption of mission/business processes. Clustering of multiple application servers is a common approach to providing fail-safe application availability when system MAC and confidentiality levels require redundancy.

Check Content

Interview the ISSO. Obtain the correct configuration for clustering used by the site.

Review the vRealize Automation appliance's installation, environment, and configuration. Determine if vRA clustering has been correctly implemented.

If vRA is not correctly implementing clustering, this is a finding.

Fix Text

Interview the ISSO. Obtain the correct configuration for clustering used by the site.

Configure vRealize Automation to be in compliance with the clustering design provided by the ISSO.