Audit VMware Aria Operations for Logs 8
Overview
Auditing VMware Aria Operations for Logs for STIG compliance involves scanning the application, the cassandra and tc server services, and the underlying Photon OS.
When auditing VMware Aria Operations for Logs we will split up tasks between product and appliance based controls which are defined as follows:
- Product Control: Configurations that interact with the Product via the User Interface or API that are exposed to administrators. Whether these are Default or Non-Default, the risk of mis-configuration affecting availability of the product is low but could impact how the environment is operated if not assessed.
- Appliance Control: Appliance controls deal with the underlying components (databases, web servers, Photon OS, etc.) that make up the product. Altering these add risk to product availability if precautionary steps and care in implementation are not taken. Identifying and relying on Default settings in this category makes this category less risky (Default Appliance Controls should be seen as a positive).
The VMware Aria Operations for Logs auditing uses InSpec over an SSH connection. It is recommended to disable SSH after the auditing is complete.
Prerequisites
Versions listed below were used for this documentation. Other versions of these tools may work as well but if issues are found it is recommended to utilize the versions listed here.
- The vmware-vrli-8.x-stig-baseline profile downloaded.
- The vmware-photon-4.0-stig-baseline profile downloaded.
- InSpec/Cinc Auditor 6.6.0
- SAF CLI 1.4.0
- STIG Viewer 2.17
- A VMware Aria Operations for Logs environment. Version 8.18 was used in these examples.
- An account with SSH access to VMware Aria Operations for Logs.
Assumptions
- Commands are initiated from a Linux machine. Windows will also work but paths and commands may need to be adjusted from the examples.
- The DOD Compliance and Automation repository downloaded and extracted to
/usr/share/stigs
. - CINC Auditor is used in lieu of InSpec. If InSpec is used replace
cinc-auditor
withinspec
when running commands.
Auditing VMware Aria Operations for Logs
Update profile inputs
Included in each of the vmware-vrli-8.x-stig-baseline
sub-folders (ariaopslogs, cassandra, and tcserver) is an inspec input file named ‘inspec.yml’.
Additionally, at the top level, an inputs-example.yml
file is included that “rolls up” all of the variables into one file, and can be edited and utilized at the command line.
Evaluate each of the input files (ariaopslogs/inspec.yml
, cassandra\inspec.yml
, tcserver\inspec.yml
), and if any of the input variables need to be over-ridden, then make sure those variables are included in the top level inputs-example.yml
file. Examples are provided below.
VMware Aria Operations for Logs - Sample Inputs
# Application
apipath: "loginsight.domain:9543/api/v2"
username: "admin"
password: "PASSWORD"
ntpServers: ["0.vmware.pool.ntp.org", "1.vmware.pool.ntp.org", "2.vmware.pool.ntp.org", "3.vmware.pool.ntp.org"]
# Cassandra
ipaddress: "10.10.10.10"
# tc Server
maxThreads: "150"
minUmask: "0007"
connectionTimeout: "20000"
maxKeepAliveRequests: "50"
sessionTimeout: "30"
# Photon
usePwqualityConf: true
syslogServer: "syslog.test.local:514"
Update the SSH config to allow scan
If the VMware Aria Operations for Logs appliance has SSH access disabled, the scans will not be able to run. SSH must be temporarily enabled to complete the scan, then can be disabled again once the audit is complete.
# Connect to the console through vCenter
vi /etc/ssh/sshd_config
# Update PermitRootLogin from no to yes and save
systemctl restart sshd
Run the audit
In this example we will be scanning a target VMware Aria Operations for Logs appliance, specifying an inputs file, and outputting a report to the CLI and to a JSON file.
# Note this command is run from the root of the profile folder. Update paths as needed (instead of '.', use './path/to/profile') if running from a different location.
> cinc-auditor exec . -t ssh://root@aria-ops-logs.domain.path --password 'replaceme' --show-progress --input-file inputs-example.yml --reporter cli json:/tmp/reports/Aria_Ops_Logs_8x_STIG_Report.json
# Shown below is example output at the CLI.
✔ PHTN-40-000227: The Photon operating system must not send IPv4 Internet Control Message Protocol redirects.
✔ Kernel Parameter net.ipv4.conf.all.send_redirects value is expected to cmp == 0
✔ Kernel Parameter net.ipv4.conf.default.send_redirects value is expected to cmp == 0
✔ PHTN-40-000228: The Photon operating system must log IPv4 packets with impossible addresses.
✔ Kernel Parameter net.ipv4.conf.all.log_martians value is expected to cmp == 1
✔ Kernel Parameter net.ipv4.conf.default.log_martians value is expected to cmp == 1
✔ PHTN-40-000229: The Photon operating system must use a reverse-path filter for IPv4 network traffic.
✔ Kernel Parameter net.ipv4.conf.all.rp_filter value is expected to cmp == 1
✔ Kernel Parameter net.ipv4.conf.default.rp_filter value is expected to cmp == 1
Profile Summary: zz successful controls, zz control failures, zz controls skipped
Test Summary: zz successful, zz failures, zz skipped
Convert the results to CKL
If a STIG Viewer Checklist (CKL) file is needed then the results from the scans can be converted to CKL with the SAF CLI.
# Converting the scan results from the prior section to CKL
saf convert hdf2ckl -i /tmp/reports/Aria_Ops_Logs_8x_STIG_Report.json -o /tmp/reports/Aria_Ops_Logs_8x_STIG_Report.ckl --hostname aria-ops-logs --fqdn aria-ops-logs.domain.path --ip 10.10.10.20 --mac 00:00:00:00:00:00
Opening the CKL file in STIG Viewer will look like the example screenshot below. Note the InSpec results are included in the Finding Details
pane.