APACHE SITE 2.0 for Unix

All directives specified in this STIG must be specifically set (i.e. the server is not allowed to revert to programmed defaults for these directives). Included files should be reviewed if they are used. Procedures for reviewing included files are included in the overview document. The use of .htaccess files are not authorized for use according to the STIG. However, if they are used, there are procedures for reviewing them in the overview document. The Web Policy STIG should be used in addition to the Apache Site and Server STIGs in order to do a comprehensive web server review.

Details

Version / Release: V1R1

Published: 2011-12-12

Updated At: 2018-09-23 01:25:43

Compare/View Releases

Select any two versions of this STIG to compare the individual requirements

Select any old version/release of this STIG to view the previous requirements

Actions

Download

Filter


Findings
Severity Open Not Reviewed Not Applicable Not a Finding
Overall 0 0 0 0
Low 0 0 0 0
Medium 0 0 0 0
High 0 0 0 0
Drop CKL or SCAP (XCCDF) results here.

    Vuln Rule Version CCI Severity Title Description Status Finding Details Comments
    SV-33022r1_rule WG210 A22 MEDIUM Web content directories must not be anonymously shared. Sharing web content is a security risk when a web server is involved. Users accessing the share anonymously could experience privileged access to the content of such directories. Network sharable directories expose those directories and their contents to
    SV-30576r2_rule WG360 A22 HIGH Symbolic links must not be used in the web content directory tree. A symbolic link allows a file or a directory to be referenced using a symbolic name raising a potential hazard if symbolic linkage is made to a sensitive area. When web scripts are executed and symbolic links are allowed, the web user could be allowed to
    SV-6928r4_rule WG400 A22 MEDIUM All interactive programs (CGI) must be placed in a designated directory with appropriate permissions. CGI scripts represents one of the most common and exploitable means of compromising a web server. By definition, CGI are executable by the operating system of the host server. While access control is provided via the web service, the execution of CGI prog
    SV-33018r1_rule WG110 A22 MEDIUM The number of allowed simultaneous requests must be set. Resource exhaustion can occur when an unlimited number of concurrent requests are allowed on a web site, facilitating a denial of service attack. Mitigating this kind of attack will include limiting the number of concurrent HTTP/HTTPS requests per IP addr
    SV-33020r1_rule WG170 A22 LOW Each readable web document directory must contain either a default, home, index, or equivalent file. The goal is to completely control the web users experience in navigating any portion of the web document root directories. Ensuring all web content directories have at least the equivalent of an index.html file is a significant factor to accomplish this e
    SV-33023r1_rule WG230 A22 HIGH Web server administration must be performed over a secure path or at the local console. Logging in to a web server via an unencrypted protocol or service, to perform updates and maintenance, is a major risk. In all such cases, user accounts and passwords are passed in the plain text. An encrypted protocol or service must be used for remote a
    SV-33025r1_rule WG240 A22 MEDIUM Logs of web server access and errors must be established and maintained A major tool in exploring the web site use, attempted use, unusual conditions, and problems are reported in the access and error logs. In the event of a security incident, these logs can provide the SA and the web manager with valuable information. Withou
    SV-33033r1_rule WG250 A22 MEDIUM Log file access must be restricted to System Administrators, Web Administrators or Auditors. A major tool in exploring the web site use, attempted use, unusual conditions, and problems are the access and error logs. In the event of a security incident, these logs can provide the SA and the web manager with valuable information. To ensure the inte
    SV-32830r1_rule WG260 A22 MEDIUM Only web sites that have been fully reviewed and tested must exist on a production web server. In the case of a production web server, areas for content development and testing will not exist, as this type of content is only permissible on a development web site. The process of developing on a functional production web site entails a degree of tria
    SV-33027r1_rule WG290 A22 HIGH Web client access to the content directories must be restricted to read and execute. Excessive permissions for the anonymous web user account are one of the most common faults contributing to the compromise of a web server. If this user is able to upload and execute files on the web server, the organization or owner of the server will no
    SV-33028r1_rule WG310 A22 LOW A private web server must not respond to requests from public search engines. Search engines are constantly at work on the Internet. Search engines are augmented by agents, often referred to as spiders or bots, which endeavor to capture and catalog web site content. In turn, these search engines make the content they obtain and cat
    SV-33029r1_rule WG340 A22 MEDIUM A private web server must utilize TLS v 1.0 or greater. Transport Layer Security (TLS) encryption is a required security setting for a private web server. This check precludes the possibility that a valid certificate has been obtained, but TLS has not been activated or is not being used. Transactions encrypted
    SV-33031r1_rule WG350 A22 MEDIUM A private web server will have a valid DoD server certificate. This check verifies that DoD is a hosted web site's CA. The certificate is actually a DoD-issued server certificate used by the organization being reviewed. This is used to verify the authenticity of the web site to the user. If the certificate is not for
    SV-33032r1_rule WG490 A22 LOW Java software on production web servers must be limited to class files and the JAVA virtual machine. From the source code in a .java or a .jpp file, the Java compiler produces a binary file with an extension of .class. The .java or .jpp file would, therefore, reveal sensitive information regarding an application’s logic and permissions to resources on
    SV-36641r1_rule WG430 A22 MEDIUM Anonymous FTP user access to interactive scripts is prohibited. The directories containing the CGI scripts, such as PERL, must not be accessible to anonymous users via FTP. This applies to all directories that contain scripts that can dynamically produce web pages in an interactive manner (i.e., scripts based upon use
    SV-6932r5_rule WG460 A22 MEDIUM PERL scripts must use the TAINT option. PERL (Practical Extraction and Report Language) is an interpreted language optimized for scanning arbitrary text files, extracting information from those text files, and printing reports based on that information. The language is often used in shell scrip
    SV-33021r1_rule WG205 A22 MEDIUM The web document (home) directory must be in a separate partition from the web server’s system files. Application partitioning enables an additional security measure by securing user traffic under one security context, while managing system and application files under another. Web content is can be to an anonymous web user. For such an account to have ac
    SV-33026r1_rule WG265 A22 LOW The required DoD banner page must be displayed to authenticated users accessing a DoD private web site. A consent banner will be in place to make prospective entrants aware that the web site they are about to enter is a DoD web site and their activity is subject to monitoring. The May 9, 2008 Policy on Use of Department of Defense (DoD) Information Systems
    SV-33019r1_rule WG140 A22 MEDIUM Private web servers must require certificates issued from a DoD-authorized Certificate Authority. Web sites requiring authentication within the DoD must utilize PKI as an authentication mechanism for web users. Information systems residing behind web servers requiring authorization based on individual identity must use the identity provided by certifi
    SV-33024r1_rule WG235 A22 HIGH Web Administrators must only use encrypted connections for Document Root directory uploads. Logging in to a web server via an unencrypted protocol or service, to upload documents to the web site, is a risk if proper encryption is not utilized to protect the data being transmitted. An encrypted protocol or service must be used for remote access
    SV-36699r1_rule WG237 A22 MEDIUM Remote authors or content providers must have all files scanned for viruses and malicious code before uploading files to the Document Root directory. Remote web authors should not be able to upload files to the Document Root directory structure without virus checking and checking for malicious or mobile code. A remote web user, whose agency has a Memorandum of Agreement (MOA) with the hosting agency an
    SV-36642r1_rule WG242 A22 MEDIUM Log file data must contain required data elements. The use of log files is a critical component of the operation of the Information Systems (IS) used within the DoD, and they can provide invaluable assistance with regard to damage assessment, causation, and the recovery of both affected components and dat
    SV-36643r1_rule WG255 A22 MEDIUM Access to the web server log files must be restricted to administrators, web administrators, and auditors. A major tool in exploring the web site use, attempted use, unusual conditions, and problems are the access and error logs. In the event of a security incident, these logs can provide the SA and the web administrator with valuable information. Because of t
    SV-33030r1_rule WG342 A22 MEDIUM Public web servers must use TLS if authentication is required. TLS encryption is optional for a public web server. However, if authentication and encryption are used, then the use of TLS is required. Transactions encrypted with DoD PKI certificates are necessary when information being transferred is not intended to b
    SV-34015r1_rule WG610 A22 LOW Web sites must utilize ports, protocols, and services according to PPSM guidelines. Failure to comply with DoD ports, protocols, and services (PPS) requirements can result in compromise of enclave boundary protections and/or functionality of the AIS. The IAM will ensure web servers are configured to use only authorized PPS in accordance
    SV-33192r1_rule WA00605 A22 MEDIUM Error logging must be enabled. The server error logs are invaluable because they can also be used to identify potential problems and enable proactive remediation. . Log data can reveal anomalous behavior such as “not found” or “unauthorized” errors that may be an evidence of a
    SV-33203r1_rule WA00612 A22 MEDIUM The sites error logs must log the correct format. The server error logs are invaluable because they can also be used to identify potential problems and enable proactive remediation. Log data can reveal anomalous behavior such as “not found” or “unauthorized” errors that may be an evidence of atta
    SV-33206r1_rule WA00615 A22 MEDIUM System logging must be enabled. The server error logs are invaluable because they can also be used to identify potential problems and enable proactive remediation. Log data can reveal anomalous behavior such as “not found” or “unauthorized” errors that may be an evidence of atta
    SV-33207r1_rule WA00620 A22 MEDIUM The LogLevel directive must be enabled. The server error logs are invaluable because they can also be used to identify potential problems and enable proactive remediation. Log data can reveal anomalous behavior such as “not found” or “unauthorized” errors that may be an evidence of atta