The HPE 3PAR OS CIMserver process must be configured to use approved encryption and communications protocols to protect the confidentiality of remote access sessions.
Severity | Group ID | Group Title | Version | Rule ID | Date | STIG Version |
---|---|---|---|---|---|---|
high | V-255291 | SRG-OS-000033-GPOS-00014 | HP3P-33-111100 | SV-255291r958408_rule | 2024-08-27 | 2 |
Description |
---|
Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session. Remote access is access to DOD nonpublic information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network. Remote access methods include, for example, dial-up, broadband, and wireless. Encryption provides a means to secure the remote connection to prevent unauthorized access to the data traversing the remote access connection (e.g., RDP), thereby providing a degree of confidentiality. The encryption strength of a mechanism is selected based on the security categorization of the information. The Common Information Model (CIM) protocol, and its associated Service Location Protocol (SLP) represent an additional, optional, management protocol for monitoring and controlling some aspects of the Storage Array. These settings limit the server to communications using TLS1.2. Satisfies: SRG-OS-000033-GPOS-00014, SRG-OS-000096-GPOS-00050, SRG-OS-000112-GPOS-00057, SRG-OS-000074-GPOS-00042 |
ℹ️ Check |
---|
If the mission does not require CIM functionality this requirement is not applicable. Verify if CIMserver is configured to run. Use the command: "cli% showcim" If the Server column shows "Disabled", this is not applicable. If the HTTP column shows "Enabled", this is a finding. If the HTTPS column shows "Disabled", this is a finding. Use the command: "cli% showcim -pol" to display advanced configuration policies. If the output contains "no_tls_strict", this is a finding. |
✔️ Fix |
---|
Verify if CIMserver is configured to run. Use the command: "cli% showcim" If the Server column shows "Disabled", this is not applicable. Temporarily stop the server using the command: "cli% stopcim -f" Disable the HTTP listener, and enable the HTTPS listener, using the command: cli% setcim -http disable -https enable Set the TLS policy to utilize only TLS1.2 with the following command: cli% setcim -pol tls_strict Restart the CIMserver using the command: cli% startcim |