STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to STIGs

VMware vRealize Automation 7.x vIDM Security Technical Implementation Guide

Version

V1R2

Release Date

Sep 12, 2023

SCAP Benchmark ID

VMW_vRealize_Automation_7-x_vIDM_STIG

Total Checks

8

Tags

vmware
CAT I: 3CAT II: 5CAT III: 0

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Export CKLExport CSVExport JSONDownload STIG ZIP

Checks (8)

V-240969MEDIUMvIDM must be configured to log activity to the horizon.log file.V-240970MEDIUMvIDM must be configured correctly for the site enterprise user management system.V-240971HIGHvIDM must utilize encryption when using LDAP for authentication.V-240972MEDIUMvIDM must be configured to provide clustering.V-240973MEDIUMvIDM must be configured to log activity to the horizon.log file.V-240974HIGHvIDM, when installed in a MAC I system, must be in a high-availability (HA) cluster.V-240975MEDIUMThe vRealize Automation appliance must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.V-258456HIGHThe version of vRealize Automation 7.x vIDM running on the system must be a supported version.