Apache Server 2.4 Windows Site Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +36 −36
Comparison against the immediately-prior release (V1R3). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 36
- V-214362 Medium The Apache web server must limit the number of allowed simultaneous session requests.
- V-214363 Medium The Apache web server must perform server-side session management.
- V-214364 Medium The Apache web server must produce log records containing sufficient information to establish what type of events occurred.
- V-214365 Medium The Apache web server must not perform user management for hosted applications.
- V-214366 Medium The Apache web server must have resource mappings set to disable the serving of certain file types.
- V-214367 Medium The Apache web server must allow the mappings to unused and vulnerable scripts to be removed.
- V-214368 Medium Users and scripts running on behalf of users must be contained to the document root or home directory tree of the Apache web server.
- V-214369 Medium The Apache web server must be configured to use a specified IP address and port.
- V-214370 Medium The Apache web server must perform RFC 5280-compliant certification path validation.
- V-214371 Medium Only authenticated system administrators or the designated PKI Sponsor for the Apache web server must have access to the Apache web servers private key.
- V-214372 Medium Apache web server accounts accessing the directory tree, the shell, or other operating system functions and utilities must only be administrative accounts.
- V-214373 High Anonymous user access to the Apache web server application directories must be prohibited.
- V-214374 Medium The Apache web server must separate the hosted applications from hosted Apache web server management functionality.
- V-214375 Medium The Apache web server must invalidate session identifiers upon hosted application user logout or other session termination.
- V-214376 Medium Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application.
- V-214377 Medium The Apache web server must accept only system-generated session identifiers.
- V-214378 Medium The Apache web server must generate unique session identifiers that cannot be reliably reproduced.
- V-214379 Medium The Apache web server must generate a session ID using as much of the character set as possible to reduce the risk of brute force.
- V-214380 Medium The Apache web server must augment re-creation to a stable and known baseline.
- V-214381 Medium The Apache web server must be configured to provide clustering.
- V-214382 Medium The Apache web server document directory must be in a separate partition from the Apache web servers system files.
- V-214383 Medium The Apache web server must display a default hosted application web page, not a directory listing, when a requested web page cannot be found.
- V-214384 Medium Warning and error messages displayed to clients must be modified to minimize the identity of the Apache web server, patches, loaded modules, and directory paths.
- V-214385 Medium Debugging and trace information used to diagnose the Apache web server must be disabled.
- V-214386 Medium The Apache web server must set an absolute timeout for sessions.
- V-214387 Medium The Apache web server must set an inactive timeout for completing the TLS handshake.
- V-214388 Medium The Apache web server must restrict inbound connections from nonsecure zones.
- V-214389 Medium Non-privileged accounts on the hosting system must only access Apache web server security-relevant information and functions through a distinct administrative account.
- V-214390 Medium The Apache web server must prohibit or restrict the use of nonsecure or unnecessary ports, protocols, modules, and/or services.
- V-214391 Medium The Apache web server must only accept client certificates issued by DoD PKI or DoD-approved PKI Certification Authorities (CAs).
- V-214392 Medium The Apache web server must be tuned to handle the operational requirements of the hosted application.
- V-214393 Medium The Apache web server cookies, such as session cookies, sent to the client using SSL/TLS must not be compressed.
- V-214394 Medium Cookies exchanged between the Apache web server and the client, such as session cookies, must have cookie properties set to prohibit client-side scripts from reading the cookie data.
- V-214395 Medium Cookies exchanged between the Apache web server and the client, such as session cookies, must have cookie properties set to force the encryption of cookies.
- V-214396 High An Apache web server must maintain the confidentiality of controlled information during transmission through the use of an approved TLS version.
- V-214397 Low The Apache web server must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
Removed rules 36
- V-92485 Medium The Apache web server must limit the number of allowed simultaneous session requests.
- V-92487 Medium The Apache web server must perform server-side session management.
- V-92495 Medium The Apache web server must produce log records containing sufficient information to establish what type of events occurred.
- V-92503 Medium The Apache web server must not perform user management for hosted applications.
- V-92505 Medium The Apache web server must have resource mappings set to disable the serving of certain file types.
- V-92507 Medium The Apache web server must allow the mappings to unused and vulnerable scripts to be removed.
- V-92511 Medium Users and scripts running on behalf of users must be contained to the document root or home directory tree of the Apache web server.
- V-92513 Medium The Apache web server must be configured to use a specified IP address and port.
- V-92517 Medium The Apache web server must perform RFC 5280-compliant certification path validation.
- V-92519 Medium Only authenticated system administrators or the designated PKI Sponsor for the Apache web server must have access to the Apache web servers private key.
- V-92527 Medium Apache web server accounts accessing the directory tree, the shell, or other operating system functions and utilities must only be administrative accounts.
- V-92529 High Anonymous user access to the Apache web server application directories must be prohibited.
- V-92531 Medium The Apache web server must separate the hosted applications from hosted Apache web server management functionality.
- V-92533 Medium The Apache web server must invalidate session identifiers upon hosted application user logout or other session termination.
- V-92535 Medium Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application.
- V-92537 Medium The Apache web server must accept only system-generated session identifiers.
- V-92539 Medium The Apache web server must generate unique session identifiers that cannot be reliably reproduced.
- V-92543 Medium The Apache web server must generate a session ID using as much of the character set as possible to reduce the risk of brute force.
- V-92545 Medium The Apache web server must augment re-creation to a stable and known baseline.
- V-92547 Medium The Apache web server must be configured to provide clustering.
- V-92549 Medium The Apache web server document directory must be in a separate partition from the Apache web servers system files.
- V-92553 Medium The Apache web server must display a default hosted application web page, not a directory listing, when a requested web page cannot be found.
- V-92555 Medium Warning and error messages displayed to clients must be modified to minimize the identity of the Apache web server, patches, loaded modules, and directory paths.
- V-92557 Medium Debugging and trace information used to diagnose the Apache web server must be disabled.
- V-92559 Medium The Apache web server must set an absolute timeout for sessions.
- V-92561 Medium The Apache web server must set an inactive timeout for completing the TLS handshake.
- V-92565 Medium The Apache web server must restrict inbound connections from nonsecure zones.
- V-92567 Medium Non-privileged accounts on the hosting system must only access Apache web server security-relevant information and functions through a distinct administrative account.
- V-92573 Medium The Apache web server must prohibit or restrict the use of nonsecure or unnecessary ports, protocols, modules, and/or services.
- V-92575 Medium The Apache web server must only accept client certificates issued by DoD PKI or DoD-approved PKI Certification Authorities (CAs).
- V-92579 Medium The Apache web server must be tuned to handle the operational requirements of the hosted application.
- V-92585 Medium The Apache web server cookies, such as session cookies, sent to the client using SSL/TLS must not be compressed.
- V-92587 Medium Cookies exchanged between the Apache web server and the client, such as session cookies, must have cookie properties set to force the encryption of cookies.
- V-92589 High An Apache web server must maintain the confidentiality of controlled information during transmission through the use of an approved TLS version.
- V-92595 Low The Apache web server must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
- V-92855 Medium Cookies exchanged between the Apache web server and the client, such as session cookies, must have cookie properties set to prohibit client-side scripts from reading the cookie data.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- AS24-W2-000010
- Vuln IDs
-
- V-214362
- V-92485
- Rule IDs
-
- SV-214362r395442_rule
- SV-102573
Checks: C-15573r277827_chk
Open the <'INSTALL PATH'>\conf\httpd.conf file with an editor and search for the following directive: MaxKeepAliveRequests Verify the value is "100" or greater. If the directive is not set to "100" or greater, this is a finding.
Fix: F-15571r277828_fix
Open the <'INSTALL PATH'>\conf\httpd.conf file with an editor and search for the following directive: MaxKeepAliveRequests Set the directive to a value of "100" or greater; add the directive if it does not exist. Restart the Apache service.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- AS24-W2-000020
- Vuln IDs
-
- V-214363
- V-92487
- Rule IDs
-
- SV-214363r395442_rule
- SV-102575
Checks: C-15574r277830_chk
In a command line, navigate to <'INSTALL PATH'>\bin. Run "httpd -M" to view a list of installed modules. If the module "mod_session" is not enabled, this is a finding.
Fix: F-15572r277831_fix
Uncomment the "mod_session" module in the <'INSTALLED PATH'>\conf\httpd.conf file. Additional documentation can be found at: https://httpd.apache.org/docs/2.4/mod/mod_usertrack.html https://httpd.apache.org/docs/2.4/mod/mod_session.html
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- AS24-W2-000090
- Vuln IDs
-
- V-214364
- V-92495
- Rule IDs
-
- SV-214364r395721_rule
- SV-102583
Checks: C-15575r277833_chk
Review the access log file. If necessary, review the <'INSTALLED PATH'>\conf\httpd.conf file to determine the location of the logs. Items to be logged are as shown in this sample line in the <'INSTALLED PATH'>\conf\httpd.conf file: <IfModule log_config_module> LogFormat "%a %A %h %H %l %m %s %t %u %U \"%{Referer}i\" " combined </IfModule> If the web server is not configured to capture the required audit events for all sites and virtual directories, this is a finding.
Fix: F-15573r277834_fix
Open the <'INSTALLED PATH'>\conf\httpd.conf file. Configure the "LogFormat" to look like the following within the <IfModule log_config_module> block: LogFormat "%a %A %h %H %l %m %s %t %u %U \"%{Referer}i\" " combined
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- AS24-W2-000240
- Vuln IDs
-
- V-214365
- V-92503
- Rule IDs
-
- SV-214365r395853_rule
- SV-102591
Checks: C-15576r277836_chk
Interview the System Administrator (SA) about the role of the Apache web server. If the web server is hosting an application, have the SA provide supporting documentation on how the application's user management is accomplished outside of the web server. If the web server is not hosting an application, this is Not Applicable. If the web server is performing user management for hosted applications, this is a finding. If the web server is hosting an application and the SA cannot provide supporting documentation on how the application's user management is accomplished outside of the Apache web server, this is a finding.
Fix: F-15574r277837_fix
Reconfigure any hosted applications on the Apache web server to perform user management outside the web server. Document how the hosted application user management is accomplished.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- AS24-W2-000300
- Vuln IDs
-
- V-214366
- V-92505
- Rule IDs
-
- SV-214366r395853_rule
- SV-102593
Checks: C-15577r277839_chk
Review the <'INSTALLED PATH'>\conf\httpd.conf file. If "Action" or "AddHandler" exist and they configure .exe, .dll, .com, .bat, or .csh, or any other shell as a viewer for documents, this is a finding.
Fix: F-15575r277840_fix
Disable MIME types for .exe, .dll, .com, .bat, and .csh programs. If "Action" or "AddHandler" exist and they configure .exe, .dll, .com, .bat, or .csh, remove those references.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- AS24-W2-000310
- Vuln IDs
-
- V-214367
- V-92507
- Rule IDs
-
- SV-214367r395853_rule
- SV-102595
Checks: C-15578r277842_chk
Locate cgi-bin files and directories enabled in the Apache configuration via "Script", "ScriptAlias" or "ScriptAliasMatch", or "ScriptInterpreterSource" directives. If any script is present that is not needed for application operation, this is a finding.
Fix: F-15576r277843_fix
Remove any scripts in cgi-bin directory if they are not needed for application operation.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- AS24-W2-000350
- Vuln IDs
-
- V-214368
- V-92511
- Rule IDs
-
- SV-214368r395853_rule
- SV-102599
Checks: C-15579r277845_chk
Review the <'INSTALLED PATH'>\conf\httpd.conf file and search for the following directive: Directory For every root directory entry (i.e., <Directory />), verify the following exists. If it does not, this is a finding: Require all denied If the statement above is not found in the root directory statement, this is a finding.
Fix: F-15577r277846_fix
Edit the <'INSTALLED PATH'>\conf\httpd.conf file and set the root directory directive as follows: Directory Require all denied
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- AS24-W2-000360
- Vuln IDs
-
- V-214369
- V-92513
- Rule IDs
-
- SV-214369r395856_rule
- SV-102601
Checks: C-15580r277848_chk
Review the <'INSTALLED PATH'>\conf\httpd.conf file and search for the following directive: Listen For any enabled "Listen" directives, verify they specify both an IP address and port number. If the "Listen" directive is found with only an IP address or only a port number specified, this is finding. If the IP address is all zeros (i.e. 0.0.0.0:80 or [::ffff:0.0.0.0]:80), this is a finding. If the "Listen" directive does not exist, this is a finding.
Fix: F-15578r277849_fix
Edit the <'INSTALLED PATH'>\conf\httpd.conf file and set the "Listen" directive to listen on a specific IP address and port.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- AS24-W2-000380
- Vuln IDs
-
- V-214370
- V-92517
- Rule IDs
-
- SV-214370r505100_rule
- SV-102605
Checks: C-15581r505098_chk
Review the <'INSTALLED PATH'>\conf\httpd.conf file to determine if the "SSLVerifyClient" and "SSLVerifyDepth" directives exist and look like the following. If they do not, this is a finding. SSLVerifyClient require SSLVerifyDepth 1 If "SSLVerifyDepth" is set to "0", this is a finding.
Fix: F-15579r505099_fix
Ensure that client verification is enabled. For each enabled hosted application on the server, enable and set "SSLVerifyClient" to "require" and ensure that the server is configured to verify the client certificate by enabling "SSLVerifyDepth". Example: SSLVerifyClient require Find the line "SSLVerifyDepth" and ensure it is set properly: SSLVerifyDepth 1 "SSLVerifyDepth" is set based on the number of CAs that are required in the certificate chain to check, before the client certificate is accepted as valid. A setting of "0" would allow self-signed CAs to validate client certificates, which is not desirable in this context. Additional Information: https://httpd.apache.org/docs/current/mod/mod_ssl.html
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- AS24-W2-000390
- Vuln IDs
-
- V-214371
- V-92519
- Rule IDs
-
- SV-214371r397597_rule
- SV-102607
Checks: C-15582r277854_chk
If the Apache web server does not have a private key, this is Not Applicable. Review the private key path in the "SSLCertificateFile" directive. Verify only authenticated System Administrators and the designated PKI Sponsor for the web server can access the web server private key. If the private key is accessible by unauthenticated or unauthorized users, this is a finding.
Fix: F-15580r277855_fix
Configure the Apache web server to ensure only authenticated and authorized users can access the web server's private key.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- AS24-W2-000430
- Vuln IDs
-
- V-214372
- V-92527
- Rule IDs
-
- SV-214372r397711_rule
- SV-102615
Checks: C-15583r277857_chk
Review the web server documentation and configuration to determine what web server accounts are available on the server. If any directories or files are owned by anyone other than root, this is a finding. If non-privileged web server accounts are available with access to functions, directories, or files not needed for the role of the account, this is a finding.
Fix: F-15581r277858_fix
Limit the functions, directories, and files that are accessible by each account and role to administrative accounts and remove or modify non-privileged account access.
- RMF Control
- SC-2
- Severity
- H
- CCI
- CCI-001082
- Version
- AS24-W2-000440
- Vuln IDs
-
- V-214373
- V-92529
- Rule IDs
-
- SV-214373r397711_rule
- SV-102617
Checks: C-15584r277860_chk
Obtain a list of the user accounts for the system, noting the privileges for each account. Verify with the System Administrator (SA) or the Information System Security Officer (ISSO) that all privileged accounts are mission essential and documented. Verify with the SA or the ISSO that all non-administrator access to shell scripts and operating system functions are mission essential and documented. If undocumented privileged accounts are present, this is a finding. If undocumented access to shell scripts or operating system functions is present, this is a finding.
Fix: F-15582r277861_fix
Ensure non-administrators are not allowed access to the directory tree, the shell, or other operating system functions and utilities.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- AS24-W2-000450
- Vuln IDs
-
- V-214374
- V-92531
- Rule IDs
-
- SV-214374r397711_rule
- SV-102619
Checks: C-15585r277863_chk
Review the web server documentation and deployed configuration to determine whether hosted application functionality is separated from web server management functions. If the functions are not separated, this is a finding.
Fix: F-15583r277864_fix
Configure Apache to separate the hosted applications from web server management functionality.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001185
- Version
- AS24-W2-000460
- Vuln IDs
-
- V-214375
- V-92533
- Rule IDs
-
- SV-214375r803279_rule
- SV-102621
Checks: C-15586r803277_chk
Working with the administrator, inspect the module used to invalidate sessions upon logout or other organizationally defined event (such as removing a CAC). Verify the session max age in that module is set to "1". If it does not exist, this is a finding. If the session max age is not set to "1", this is a finding. Alternative instruction: Log in to the site using a test account. Log out of the site. Confirm the session and session ID were terminated and use of the website is no longer possible. If use of the site is still possible after logging out, this is a finding.
Fix: F-15584r803278_fix
Edit the .conf file and add or set the session max age to "1". This conf file can vary depending on what type of logon session ID management is being leveraged.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001664
- Version
- AS24-W2-000470
- Vuln IDs
-
- V-214376
- V-92535
- Rule IDs
-
- SV-214376r505103_rule
- SV-102623
Checks: C-15587r505101_chk
Review the <'INSTALLED PATH'>\conf\httpd.conf file. If "HttpOnly; secure" is not configured, this is a finding. Review the code. If when creating cookies, the following is not occurring, this is a finding: function setCookie() { document.cookie = "ALEPH_SESSION_ID = $SESS; path = /; secure"; }
Fix: F-15585r505102_fix
Add this line to the "httpd.conf" file: Header always edit Set-Cookie ^(.*)$ $1;HttpOnly;secure Add the secure attribute to the JavaScript set cookie: function setCookie() { document.cookie = "ALEPH_SESSION_ID = $SESS; path = /; secure"; } "HttpOnly" cannot be used since by definition this is a cookie set by JavaScript. Restart www_server and Apache.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001664
- Version
- AS24-W2-000480
- Vuln IDs
-
- V-214377
- V-92537
- Rule IDs
-
- SV-214377r397732_rule
- SV-102625
Checks: C-15588r277872_chk
Review the <'INSTALL PATH'>\conf\httpd.conf file. Verify the "mod_unique_id" is loaded. If it does not exist, this is a finding.
Fix: F-15586r277873_fix
Edit the <'INSTALL PATH'>\conf\httpd.conf file and load the "mod_unique_id" module. Restart the Apache service.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001188
- Version
- AS24-W2-000500
- Vuln IDs
-
- V-214378
- V-92539
- Rule IDs
-
- SV-214378r397735_rule
- SV-102627
Checks: C-15589r277875_chk
Review the <'INSTALLED PATH'>\conf\httpd.conf file. Verify the "mod_unique_id" is loaded. If it does not exist, this is a finding.
Fix: F-15587r277876_fix
Edit the <'INSTALLED PATH'>\conf\httpd.conf file and load the "mod_unique_id" module. Restart Apache.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001188
- Version
- AS24-W2-000520
- Vuln IDs
-
- V-214379
- V-92543
- Rule IDs
-
- SV-214379r397735_rule
- SV-102631
Checks: C-15590r277878_chk
Review the <'INSTALLED PATH'>\conf\httpd.conf file. Check to see if the "mod_unique_id" is loaded. If it does not exist, this is a finding.
Fix: F-15588r277879_fix
Edit the <'INSTALLED PATH'>\conf\httpd.conf file and load the "mod_unique_id" module. Restart Apache.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- AS24-W2-000540
- Vuln IDs
-
- V-214380
- V-92545
- Rule IDs
-
- SV-214380r397738_rule
- SV-102633
Checks: C-15591r277881_chk
Interview the System Administrator for the Apache web server. Ask for documentation on the disaster recovery methods tested and planned for the Apache web server in the event of the necessity for rollback. If documentation for a disaster recovery has not been established, this is a finding.
Fix: F-15589r277882_fix
Prepare documentation for disaster recovery methods for the Apache web server in the event of the necessity for rollback. Document and test the disaster recovery methods designed.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- AS24-W2-000560
- Vuln IDs
-
- V-214381
- V-92547
- Rule IDs
-
- SV-214381r397738_rule
- SV-102635
Checks: C-15592r277884_chk
Review the <'INSTALLED PATH'>\conf\httpd.conf file. Verify the "mod_proxy" is loaded. If it does not exist, this is a finding. If the "mod_proxy" module is loaded and the "ProxyPass" directive is not configured, this is a finding.
Fix: F-15590r277885_fix
Edit the <'INSTALLED PATH'>\conf\httpd.conf file and load the "mod_proxy" module. Set the "ProxyPass" directive.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- AS24-W2-000580
- Vuln IDs
-
- V-214382
- V-92549
- Rule IDs
-
- SV-214382r397747_rule
- SV-102637
Checks: C-15593r277887_chk
Determine whether the public web server has a two-way trusted relationship with any private asset located within the network. Private web server resources (e.g., drives, folders, printers, etc.) will not be directly mapped to or shared with public web servers. If sharing is selected for any web folder, this is a finding. If private resources (e.g., drives, partitions, folders/directories, printers, etc.) are shared with the public web server, this is a finding.
Fix: F-15591r277888_fix
Configure the public web server to not have a trusted relationship with any system resource that is also not accessible to the public. Web content is not to be shared via Microsoft shares or NFS mounts.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- AS24-W2-000610
- Vuln IDs
-
- V-214383
- V-92553
- Rule IDs
-
- SV-214383r397843_rule
- SV-102641
Checks: C-15594r277890_chk
Review the DocumentRoot directive in the <'INSTALLED PATH'>\conf\httpd.conf file. Note each location following the "DocumentRoot" string. This is the configured path(s) to the document root directory(s). To view a list of the directories and sub-directories and the file "index.html", from each stated "DocumentRoot" location, enter the following command: dir "index.html" Review the results for each document root directory and its subdirectories. If a directory does not contain an "index.html" or equivalent default document, this is a finding.
Fix: F-15592r277891_fix
Add a default document to the applicable directories.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- AS24-W2-000620
- Vuln IDs
-
- V-214384
- V-92555
- Rule IDs
-
- SV-214384r505106_rule
- SV-102643
Checks: C-15595r505104_chk
Review the <'INSTALLED PATH'>\conf\httpd.conf file. If the "ErrorDocument" directive is not being used, this is a finding.
Fix: F-15593r505105_fix
Edit the <'INSTALLED PATH'>\conf\httpd.conf file and use the "ErrorDocument" directive to enable custom error pages. ErrorDocument 500 "Sorry, our script crashed. Oh dear" ErrorDocument 500 /cgi-bin/crash-recover ErrorDocument 500 http://error.example.com/server_error.html ErrorDocument 404 /errors/not_found.html ErrorDocument 401 /subscription/how_to_subscribe.html The syntax of the ErrorDocument directive is: ErrorDocument <3-digit-code> <action> Additional Information: https://httpd.apache.org/docs/2.4/custom-error.html
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- AS24-W2-000630
- Vuln IDs
-
- V-214385
- V-92557
- Rule IDs
-
- SV-214385r397843_rule
- SV-102645
Checks: C-15596r277896_chk
Review the <'INSTALLED PATH'>\conf\httpd.conf file. For any enabled "TraceEnable" directives, verify they are part of the server-level configuration (i.e., not nested in a "Directory" or "Location" directive). Also, verify the "TraceEnable" directive is set to "Off". If the "TraceEnable" directive is not part of the server-level configuration and/or is not set to "Off", this is a finding. If the directive does not exist in the "conf" file, this is a finding because the default value is "On".
Fix: F-15594r277897_fix
Edit the <'INSTALLED PATH'>\conf\httpd.conf file and add or set the value of "EnableTrace" to "Off".
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- AS24-W2-000640
- Vuln IDs
-
- V-214386
- V-92559
- Rule IDs
-
- SV-214386r803282_rule
- SV-102647
Checks: C-15597r803280_chk
Review the <'INSTALL PATH'>\conf\httpd.conf file. Search for the following directive: SessionMaxAge Verify the value of "SessionMaxAge" is set to "600" or less. If the "SessionMaxAge" does not exist or is set to more than "600", this is a finding.
Fix: F-15595r803281_fix
Open the <'INSTALL PATH'>\conf\httpd.conf file. Set the "SessionMaxAge" directive to a value of "600" or less; add the directive if it does not exist. Restart the Apache service.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- AS24-W2-000650
- Vuln IDs
-
- V-214387
- V-92561
- Rule IDs
-
- SV-214387r505109_rule
- SV-102649
Checks: C-15598r505107_chk
Review the <'INSTALLED PATH'>\conf\httpd.conf file. Verify the "mod_reqtimeout" is loaded. If it does not exist, this is a finding. If the "mod_reqtimeout" module is loaded but the "RequestReadTimeout" directive is not configured, this is a finding. Note: The "RequestReadTimeout" directive must be explicitly configured (i.e., not left to a default value) to a value compatble with the organization's operations.
Fix: F-15596r505108_fix
Edit the <'INSTALLED PATH'>\conf\httpd.conf file and load the "mod_reqtimeout" module. Set the "RequestReadTimeout" directive. The "RequestReadTimeout" directive must be explicitly configured (i.e., not left to a default value) to a value compatible with the organization's operations.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- AS24-W2-000670
- Vuln IDs
-
- V-214388
- V-92565
- Rule IDs
-
- SV-214388r399640_rule
- SV-102653
Checks: C-15599r277905_chk
Review the <'INSTALLED PATH'>\conf\httpd.conf file. If "IP Address Restrictions" are not configured or IP ranges configured to be "Allow" are not restrictive enough to prevent connections from nonsecure zones, this is a finding.
Fix: F-15597r277906_fix
Configure the "http.conf" file to include restrictions. Example: <RequireAll> Require not host phishers.example.com moreidiots.example </RequireAll>
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- AS24-W2-000690
- Vuln IDs
-
- V-214389
- V-92567
- Rule IDs
-
- SV-214389r399775_rule
- SV-102655
Checks: C-15600r277908_chk
Determine which tool or control file is used to control the configuration of the web server. If the control of the web server is done via control files, verify who has update access to them. If tools are being used to configure the web server, determine who has access to execute the tools. If accounts other than the System Administrator (SA), the Web Manager, or the Web Manager designees have access to the web administration tool or control files, this is a finding.
Fix: F-15598r277909_fix
Restrict access to the web administration tool to only the SA, Web Manager, or the Web Manager designees.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- AS24-W2-000780
- Vuln IDs
-
- V-214390
- V-92573
- Rule IDs
-
- SV-214390r400015_rule
- SV-102661
Checks: C-15601r277911_chk
Review the web server documentation and deployment configuration to determine which ports and protocols are enabled. Verify the ports and protocols being used are permitted, necessary for the operation of the web server and the hosted applications, and are secure for a production system. Open the <'INSTALLED PATH'>\conf\httpd.conf file. Verify only the listener for IANA well-known ports for HTTP and HTTPS are in use. If any of the ports or protocols are not permitted, are nonsecure, or are not necessary for web server operation, this is a finding.
Fix: F-15599r277912_fix
Ensure the website enforces the use of IANA well-known ports for HTTP and HTTPS.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-002470
- Version
- AS24-W2-000800
- Vuln IDs
-
- V-214391
- V-92575
- Rule IDs
-
- SV-214391r400378_rule
- SV-102663
Checks: C-15602r277914_chk
Review the "ssl.conf" file. Look for the "SSLCACertificateFile" directive. Review the path of the "SSLCACertificateFile" directive. Review the contents of <'path of cert'>\ca-bundle.crt. Examine the contents of this file to determine if the trusted CAs are DoD approved. If the trusted CA that is used to authenticate users to the website does not lead to an approved DoD CA, this is a finding. NOTE: There are non-DoD roots that must be on the server for it to function. Some applications, such as antivirus programs, require root CAs to function. DoD-approved certificate can include the External Certificate Authorities (ECA), if approved by the AO. The PKE InstallRoot 3.06 System Administrator Guide (SAG), dated 08 Jul 2008, contains a complete list of DoD, ECA, and IECA CAs.
Fix: F-15600r277915_fix
Configure the web server’s trust store to trust only DoD-approved PKIs (e.g., DoD PKI, DoD ECA, and DoD-approved external partners).
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- AS24-W2-000830
- Vuln IDs
-
- V-214392
- V-92579
- Rule IDs
-
- SV-214392r400402_rule
- SV-102667
Checks: C-15603r277917_chk
Review the <'INSTALLED PATH'>\conf\httpd.conf file. Verify the "Timeout" directive is specified to have a value of "10" seconds or less. If the "Timeout" directive is not configured or is set for more than "10" seconds, this is a finding.
Fix: F-15601r277918_fix
Add or modify the "Timeout" directive in the Apache configuration to have a value of "10" seconds or less. "Timeout 10"
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- AS24-W2-000860
- Vuln IDs
-
- V-214393
- V-92585
- Rule IDs
-
- SV-214393r400474_rule
- SV-102673
Checks: C-15604r277920_chk
Search the Apache configuration files for the "SSLCompression" directive. If the directive does not exist, this is a not a finding. If the directive exists and is not set to "off", this is a finding.
Fix: F-15602r277921_fix
Search the Apache configuration files for the "SSLCompression" directive. If the directive is present, set it to "off".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- AS24-W2-000870
- Vuln IDs
-
- V-214394
- V-92855
- Rule IDs
-
- SV-214394r803285_rule
- SV-102943
Checks: C-15605r803283_chk
Verify the "session_cookie_module" module is installed. Inspect the httpd.conf file to confirm the "session_cookie_module" is being used. If the "session_cookie_module" module is not being used, this is a finding. Search for the "Session" and "SessionCookieName" directives. If "Session" is not "on" and "SessionCookieName" does not contain "httpOnly" and "secure", this is a finding.
Fix: F-15603r803284_fix
Set "Session" to "on". Ensure the "SessionCookieName" directive includes "httpOnly" and "secure".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- AS24-W2-000880
- Vuln IDs
-
- V-214395
- V-92587
- Rule IDs
-
- SV-214395r400474_rule
- SV-102675
Checks: C-15606r277926_chk
Verify the "mod_session_crypto" module is installed. If the mod_session_crypto module is not being used, this is a finding.
Fix: F-15604r277927_fix
Ensure the "mod_session_crypto" module is installed. Enable encrypted session cookies. Example: Session On SessionCookieName session path=/ SessionCryptoPassphrase secret
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-000068
- Version
- AS24-W2-000890
- Vuln IDs
-
- V-214396
- V-92589
- Rule IDs
-
- SV-214396r395466_rule
- SV-102677
Checks: C-15607r277929_chk
In a command line, navigate to "<'INSTALLED PATH'>\bin". Run "httpd -M" to view a list of installed modules. If the module "mod_ssl" is not enabled, this is a finding. Review the <'INSTALLED PATH'>\conf\httpd.conf file to determine if the "SSLProtocol" directive exists and looks like the following: SSLProtocol -ALL +TLSv1.2 If the directive does not exist and does not contain "-ALL +TLSv1.2", this is a finding.
Fix: F-15605r277930_fix
Ensure the "SSLProtocol" is added and looks like the following in the <'INSTALLED PATH'>\conf\httpd.conf file: SSLProtocol -ALL +TLSv1.2 Ensure the "SSLEngine" parameter is set to "ON" inside the "VirtualHost" directive.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- AS24-W2-000950
- Vuln IDs
-
- V-214397
- V-92595
- Rule IDs
-
- SV-214397r401224_rule
- SV-102683
Checks: C-15608r277932_chk
Review the website to determine if "HTTP" and "HTTPS" are used in accordance with well-known ports (e.g., 80 and 443) or those ports and services as registered and approved for use by the DoD PPSM. Verify that any variation in PPS is documented, registered, and approved by the PPSM. If it is not, this is a finding.
Fix: F-15606r277933_fix
Ensure the website enforces the use of IANA well-known ports for "HTTP" and "HTTPS".