STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 5 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to VMware vRealize Automation 7.x tc Server Security Technical Implementation Guide

V-240810

CAT I (High)

tc Server VCAC accounts accessing the directory tree, the shell, or other operating system functions and utilities must be administrative accounts.

Rule ID

SV-240810r879631_rule

STIG

VMware vRealize Automation 7.x tc Server Security Technical Implementation Guide

Version

V2R3

CCIs

CCI-001082

Discussion

As a rule, accounts on a web server are to be kept to a minimum. Only administrators, web managers, developers, auditors, and web authors require accounts on the machine hosting the web server. The resources to which these accounts have access must also be closely monitored and controlled. Only the system administrator needs access to all the system's capabilities, while the web administrator and associated staff require access and control of the web content and web server configuration files. As with all secure web server installations, tc Server files and directories must be adequately protected with correct permissions.

Check Content

At the command prompt, execute the following command:

ls -alR /etc/vcac /usr/lib/vcac/server/webapps | grep -E '^-' | awk '$3 !~ /vcac|root/ {print}'

If the command produces any output, this is a finding.

Fix Text

At the command prompt, execute the following command:

If the file was found in /etc/vcac or /usr/lib/vcac/server/webapps, execute the following command:

chown vcac:vcac <file_name>

Note: Replace <file_name> for the name of the file that was returned.