VAMI must be protected from being stopped by a nonprivileged user.

Severity
Group ID
Group Title
Version
Rule ID
Date
STIG Version
mediumV-256667SRG-APP-000435-WSR-000147VCLD-70-000023SV-256667r888523_rule2023-06-151
Description
An attacker has at least two reasons to stop a web server. The first is to cause a denial of service, and the second is to put in place changes the attacker made to the web server configuration. Therefore, only administrators should ever be able to stop VAMI. The VAMI process is configured out of the box to be owned by root. This configuration must be verified and maintained.
ℹ️ Check
At the command prompt, run the following command: # ps -f -U root | awk '$0 ~ /vami-lighttpd/ && $0 !~ /awk/ {print $1}' Expected result: root If the output does not match the expected result, this is a finding.
✔️ Fix
Navigate to and open: /usr/lib/systemd/system/vami-lighttp.service Under the "[Service]" section, remove the line that beings with "User=". Restart the service with the following command: # vmon-cli --restart applmgmt