UCF STIG Viewer Logo

Web server administration must be performed over a secure path or at the local console.


Overview

Finding ID Version Rule ID IA Controls Severity
V-2249 WG230 W22 SV-33110r1_rule EBRU-1 High
Description
Logging in to a web server via an unencrypted protocol or service, to perform updates and maintenance, is a major risk. In all such cases, user accounts and passwords are passed in the plain text. An encrypted protocol or service must be used for remote access for remote access to web administration tasks. Another alternative is to administer the web server from the console, which implies physical access to the server.
STIG Date
APACHE SITE 2.0 for Windows 2011-12-12

Details

Check Text ( C-33771r1_chk )
If web administration is performed at the console, this check is N/A.

If web administration is performed remotely the following checks will apply:
1. If administration of the server is performed remotely, it will only be performed securely by system administrators.
2. If web site administration or web application administration has been delegated, those users will be documented and approved by the IAO.
3. Remote administration must be in compliance with any requirements contained within the Windows Server STIGs, and any applicable network STIGs.
4. Remote administration of any kind will be restricted to documented and authorized personnel.
5. All users performing remote administration must be authenticated.
6. All remote sessions will be encrypted and they will utilize TLS 1.0.

Review with site management how remote administration, if applicable, is configured on the web site. If remote management meets the criteria listed above, this is not a finding. If remote management is utilized and does not meet the criteria listed above, this is a finding.
Fix Text (F-29408r1_fix)
Ensure the web server administration is only performed over a secure path.