6.5

Table Of Contents
Contents
Secure Conguration 5
1
vRealize Operations Manager Security Posture 7
2
Secure Deployment of vRealize Operations Manager 9
Verify the Integrity of Installation Media 9
Hardening the Deployed Software Infrastructure 9
Reviewing Installed and Unsupported Software 10
VMware Security Advisories and Patches 10
3
Secure Conguration of vRealize Operations Manager 13
Secure the vRealize Operations Manager Console 14
Change the Root Password 14
Managing Secure Shell, Administrative Accounts, and Console Access 15
Set Boot Loader Authentication 19
Single-User or Maintenance Mode Authentication 20
Monitor Minimal Necessary User Accounts 20
Monitor Minimal Necessary Groups 20
Reseing the vRealize Operations Manager Administrator Password (Linux) 21
Congure NTP on VMware Appliances 22
Disable the TCP Timestamp Response on Linux 22
Enable FIPS 140-2 Mode 22
TLS for Data in Transit 23
Application Resources That Must be Protected 26
Congure PostgreSQL Client Authentication 27
Apache Conguration 28
Disable Conguration Modes 29
Managing Nonessential Software Components 29
Linux Installed Deployment 32
Endpoint Operations Management Agent 34
Additional Secure Conguration Activities 39
4
Network Security and Secure Communication 41
Conguring Network Seings for Virtual Application Installation 41
Conguring Ports and Protocols 49
5
Auditing and Logging on your vRealize Operations Manager System 51
Securing the Remote Logging Server 51
Use an Authorized NTP Server 51
Client Browser Considerations 51
VMware, Inc.
3