VMware vSphere 7.0 vCenter Appliance Lookup Service STIG Version Comparison
VMware vSphere 7.0 vCenter Appliance Lookup Service Security Technical Implementation Guide
Comparison
There are 1 differences between versions v1 r1 (March 7, 2023) (the "left" version) and v1 r2 (July 26, 2023) (the "right" version).
Check VCLU-70-000007 was changed between these two versions. Green, underlined text was added, red, struck-out text was removed.
The regular view of the left check and right check may be easier to read.
Text Differences
Title
Lookup Service log files must only be accessible by privileged users.
Check Content
At the command prompt, run the following command: # find /var/log/vmware/lookupsvc -xdev -type f ! -name lookupsvc-init.log -a '(' -perm /137 -o+w -o -not -user root lookupsvc -o -not -group root lookupsvc ')' -exec ls -ld {} \; If any files are returned, this is a finding. finding. Note: Prior to Update 3h, the user and group should be root.
Discussion
Log data is essential in the investigation of events. If log data were to become compromised, competent forensic analysis and discovery of the true source of potentially malicious system activity would be difficult, if not impossible, to achieve. In addition, access to log records provides information an attacker could use to their advantage because each event record might contain communication ports, protocols, services, trust relationships, usernames, etc. The Lookup Service restricts all access to log files by default, but this configuration must be verified. Satisfies: SRG-APP-000118-WSR-000068, SRG-APP-000119-WSR-000069, SRG-APP-000120-WSR-000070
Fix
At the command prompt, run the following commands: # chmod 640 o-w /var/log/vmware/lookupsvc/<file> # chown root:root lookupsvc:lookupsvc /var/log/vmware/lookupsvc/<file> Note: Substitute <file> with the listed file.