APACHE 2.2 Site for Windows Security Technical Implementation Guide

Overview

VersionDateFinding Count (28)Downloads
12018-12-24CAT I (High): 3CAT II (Medium): 21CAT III (Low): 4
STIG Description
All directives specified in this STIG must be specifically set (i.e. the server is not allowed to revert to programmed defaults for these directives). Included files should be reviewed if they are used. Procedures for reviewing included files are included in the overview document. The use of .htaccess files are not authorized for use according to the STIG. However, if they are used, there are procedures for reviewing them in the overview document. The Web Policy STIG should be used in addition to the Apache Site and Server STIGs in order to do a comprehensive web server review.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - MAC III - Administrative Classified

Finding IDSeverityTitleDescription
V-2226
LOWMEDIUMHIGH
Web content directories must not be anonymously shared.Sharing of web server content is a security risk when a web server is involved. Users accessing the share anonymously could experience privileged acce...
V-2228
LOWMEDIUMHIGH
All interactive programs must be placed in a designated directory with appropriate permissions.CGI scripts represents one of the most common and exploitable means of compromising a web server. By definition, CGI are executable by the operating s...
V-2229
LOWMEDIUMHIGH
Interactive scripts used on a web server must have proper access controls.The use of CGI scripts represent one of the most common and exploitable means of compromising a web server. By definition, CGI scripts are executable ...
V-2240
LOWMEDIUMHIGH
The number of allowed simultaneous requests must be set.Resource exhaustion can occur when an unlimited number of concurrent requests are allowed on a web site, facilitating a denial of service attack. Miti...
V-2250
LOWMEDIUMHIGH
Logs of web server access and errors must be established and maintained.A major tool in exploring the web site use, attempted use, unusual conditions, and problems are reported in the access and error logs. In the event of...
V-2252
LOWMEDIUMHIGH
Log file access must be restricted to System Administrators, Web Administrators or Auditors.A major tool in exploring the web site use, attempted use, unusual conditions and problems are the access and error logs. In the event of a security i...
V-2254
LOWMEDIUMHIGH
Only web sites that have been fully reviewed and tested must exist on a production web server.In the case of a production web server, areas for content development and testing will not exist, as this type of content is only permissible on a dev...
V-2260
LOWMEDIUMHIGH
A web site must not contain a robots.txt file.Search engines are constantly at work on the Internet. Search engines are augmented by agents, often referred to as spiders or bots, which endeavor t...
V-2262
LOWMEDIUMHIGH
A private web server must utilize an approved TLS version.Transport Layer Security (TLS) encryption is a required security setting for a private web server. Encryption of private information is essential to e...
V-2263
LOWMEDIUMHIGH
A private web server must have a valid DoD server certificate.This check verifies that DoD is a hosted web site's CA. The certificate is actually a DoD-issued server certificate used by the organization being rev...
V-2270
LOWMEDIUMHIGH
Anonymous FTP user access to interactive scripts must be prohibited.The directories containing the CGI scripts, such as PERL, must not be accessible to anonymous users via FTP. This applies to all directories that cont...
V-2272
LOWMEDIUMHIGH
PERL scripts must use the TAINT option.PERL (Practical Extraction and Report Language) is an interpreted language optimized for scanning arbitrary text files, extracting information from th...
V-3333
LOWMEDIUMHIGH
The web document (home) directory must be in a separate partition from the web server’s system files.Application partitioning enables an additional security measure by securing user traffic under one security context, while managing system and applica...
V-6531
LOWMEDIUMHIGH
Private web servers must require certificates issued from a DoD-authorized Certificate Authority.Web sites requiring authentication within the DoD must utilize PKI as an authentication mechanism for web users. Information systems residing behind w...
V-13688
LOWMEDIUMHIGH
Log file data must contain required data elements.The use of log files is a critical component of the operation of the Information Systems (IS) used within the DoD, and they can provide invaluable ass...
V-13689
LOWMEDIUMHIGH
Access to the web server log files must be restricted to Administrators, the user assigned to run the web server software, Web Manager, and Auditors.A major tool in exploring the web site use, attempted use, unusual conditions and problems are the access and error logs. In the event of a security i...
V-13694
LOWMEDIUMHIGH
Public web servers must use TLS if authentication is required.Transport Layer Security (TLS) is optional for a public web server. However, if authentication is being performed, then the use of the TLS protocol i...
V-26279
LOWMEDIUMHIGH
Error logging must be enabled.The server error logs are invaluable because they can also be used to identify potential problems and enable proactive remediation. Log data can revea...
V-26280
LOWMEDIUMHIGH
The sites error logs must log the correct format.The server error logs are invaluable because they can also be used to identify potential problems and enable proactive remediation. Log data can reve...
V-26281
LOWMEDIUMHIGH
System logging must be enabled.The server error logs are invaluable because they can also be used to identify potential problems and enable proactive remediation. Log data can revea...
V-26282
LOWMEDIUMHIGH
The LogLevel directive must be enabled.The server error logs are invaluable because they can also be used to identify potential problems and enable proactive remediation. Log data can reve...
V-2245
LOWMEDIUMHIGH
Each readable web document directory must contain either a default, home, index, or equivalent file.The goal is to completely control the web users experience in navigating any portion of the web document root directories. Ensuring all web content di...
V-2265
LOWMEDIUMHIGH
Java software on production web servers must be limited to class files and the JAVA virtual machine.From the source code in a .java or a .jpp file, the Java compiler produces a binary file with an extension of .class. The .java or .jpp file would, th...
V-6373
LOWMEDIUMHIGH
The required DoD banner page must be displayed to authenticated users accessing a DoD private website.A consent banner will be in place to make prospective entrants aware that the website they are about to enter is a DoD web site and their activity is ...
V-15334
LOWMEDIUMHIGH
Web sites must utilize ports, protocols, and services according to PPSM guidelines.Failure to comply with DoD ports, protocols, and services (PPS) requirements can result in compromise of enclave boundary protections and/or functiona...
V-2249
LOWMEDIUMHIGH
Web server administration must be performed over a secure path or at the local console.Logging into a web server remotely using an unencrypted protocol or service when performing updates and maintenance is a major risk. Data, such as us...
V-2258
LOWMEDIUMHIGH
The web client account access to the content and scripts directories must be limited to read and execute.Excessive permissions for the anonymous web user account are one of the most common faults contributing to the compromise of a web server. If this use...
V-13686
LOWMEDIUMHIGH
Web Administrators must only use encrypted connections for Document Root directory uploads.Logging in to a web server via an unencrypted protocol or service, to upload documents to the web site, is a risk if proper encryption is not utilized...