Apache Server 2.4 Windows Site Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates −20 ✎ 1
Comparison against the immediately-prior release (V2R2). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Removed rules 20
- V-214362 Medium The Apache web server must limit the number of allowed simultaneous session requests.
- V-214363 Medium The Apache web server must perform server-side session management.
- V-214364 Medium The Apache web server must produce log records containing sufficient information to establish what type of events occurred.
- V-214366 Medium The Apache web server must have resource mappings set to disable the serving of certain file types.
- V-214369 Medium The Apache web server must be configured to use a specified IP address and port.
- V-214370 Medium The Apache web server must perform RFC 5280-compliant certification path validation.
- V-214375 Medium The Apache web server must invalidate session identifiers upon hosted application user logout or other session termination.
- V-214377 Medium The Apache web server must accept only system-generated session identifiers.
- V-214378 Medium The Apache web server must generate unique session identifiers that cannot be reliably reproduced.
- V-214379 Medium The Apache web server must generate a session ID using as much of the character set as possible to reduce the risk of brute force.
- V-214381 Medium The Apache web server must be configured to provide clustering.
- V-214384 Medium Warning and error messages displayed to clients must be modified to minimize the identity of the Apache web server, patches, loaded modules, and directory paths.
- V-214385 Medium Debugging and trace information used to diagnose the Apache web server must be disabled.
- V-214386 Medium The Apache web server must set an absolute timeout for sessions.
- V-214387 Medium The Apache web server must set an inactive timeout for completing the TLS handshake.
- V-214391 Medium The Apache web server must only accept client certificates issued by DoD PKI or DoD-approved PKI Certification Authorities (CAs).
- V-214392 Medium The Apache web server must be tuned to handle the operational requirements of the hosted application.
- V-214393 Medium The Apache web server cookies, such as session cookies, sent to the client using SSL/TLS must not be compressed.
- V-214396 High An Apache web server must maintain the confidentiality of controlled information during transmission through the use of an approved TLS version.
- V-214397 Low The Apache web server must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
Content changes 1
- V-214390 Medium descriptioncheck The Apache web server must prohibit or restrict the use of nonsecure or unnecessary ports, protocols, modules, and/or services.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- AS24-W2-000240
- Vuln IDs
-
- V-214365
- V-92503
- Rule IDs
-
- SV-214365r960963_rule
- SV-102591
Checks: C-15576r277836_chk
Interview the System Administrator (SA) about the role of the Apache web server. If the web server is hosting an application, have the SA provide supporting documentation on how the application's user management is accomplished outside of the web server. If the web server is not hosting an application, this is Not Applicable. If the web server is performing user management for hosted applications, this is a finding. If the web server is hosting an application and the SA cannot provide supporting documentation on how the application's user management is accomplished outside of the Apache web server, this is a finding.
Fix: F-15574r277837_fix
Reconfigure any hosted applications on the Apache web server to perform user management outside the web server. Document how the hosted application user management is accomplished.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- AS24-W2-000310
- Vuln IDs
-
- V-214367
- V-92507
- Rule IDs
-
- SV-214367r960963_rule
- SV-102595
Checks: C-15578r277842_chk
Locate cgi-bin files and directories enabled in the Apache configuration via "Script", "ScriptAlias" or "ScriptAliasMatch", or "ScriptInterpreterSource" directives. If any script is present that is not needed for application operation, this is a finding.
Fix: F-15576r277843_fix
Remove any scripts in cgi-bin directory if they are not needed for application operation.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- AS24-W2-000350
- Vuln IDs
-
- V-214368
- V-92511
- Rule IDs
-
- SV-214368r960963_rule
- SV-102599
Checks: C-15579r277845_chk
Review the <'INSTALLED PATH'>\conf\httpd.conf file and search for the following directive: Directory For every root directory entry (i.e., <Directory />), verify the following exists. If it does not, this is a finding: Require all denied If the statement above is not found in the root directory statement, this is a finding.
Fix: F-15577r277846_fix
Edit the <'INSTALLED PATH'>\conf\httpd.conf file and set the root directory directive as follows: Directory Require all denied
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- AS24-W2-000390
- Vuln IDs
-
- V-214371
- V-92519
- Rule IDs
-
- SV-214371r961041_rule
- SV-102607
Checks: C-15582r277854_chk
If the Apache web server does not have a private key, this is Not Applicable. Review the private key path in the "SSLCertificateFile" directive. Verify only authenticated System Administrators and the designated PKI Sponsor for the web server can access the web server private key. If the private key is accessible by unauthenticated or unauthorized users, this is a finding.
Fix: F-15580r277855_fix
Configure the Apache web server to ensure only authenticated and authorized users can access the web server's private key.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- AS24-W2-000430
- Vuln IDs
-
- V-214372
- V-92527
- Rule IDs
-
- SV-214372r1138072_rule
- SV-102615
Checks: C-15583r277857_chk
Review the web server documentation and configuration to determine what web server accounts are available on the server. If any directories or files are owned by anyone other than root, this is a finding. If non-privileged web server accounts are available with access to functions, directories, or files not needed for the role of the account, this is a finding.
Fix: F-15581r277858_fix
Limit the functions, directories, and files that are accessible by each account and role to administrative accounts and remove or modify non-privileged account access.
- RMF Control
- SC-2
- Severity
- H
- CCI
- CCI-001082
- Version
- AS24-W2-000440
- Vuln IDs
-
- V-214373
- V-92529
- Rule IDs
-
- SV-214373r1138073_rule
- SV-102617
Checks: C-15584r277860_chk
Obtain a list of the user accounts for the system, noting the privileges for each account. Verify with the System Administrator (SA) or the Information System Security Officer (ISSO) that all privileged accounts are mission essential and documented. Verify with the SA or the ISSO that all non-administrator access to shell scripts and operating system functions are mission essential and documented. If undocumented privileged accounts are present, this is a finding. If undocumented access to shell scripts or operating system functions is present, this is a finding.
Fix: F-15582r277861_fix
Ensure non-administrators are not allowed access to the directory tree, the shell, or other operating system functions and utilities.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- AS24-W2-000450
- Vuln IDs
-
- V-214374
- V-92531
- Rule IDs
-
- SV-214374r1138074_rule
- SV-102619
Checks: C-15585r277863_chk
Review the web server documentation and deployed configuration to determine whether hosted application functionality is separated from web server management functions. If the functions are not separated, this is a finding.
Fix: F-15583r277864_fix
Configure Apache to separate the hosted applications from web server management functionality.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001664
- Version
- AS24-W2-000470
- Vuln IDs
-
- V-214376
- V-92535
- Rule IDs
-
- SV-214376r1043180_rule
- SV-102623
Checks: C-15587r505101_chk
Review the <'INSTALLED PATH'>\conf\httpd.conf file. If "HttpOnly; secure" is not configured, this is a finding. Review the code. If when creating cookies, the following is not occurring, this is a finding: function setCookie() { document.cookie = "ALEPH_SESSION_ID = $SESS; path = /; secure"; }
Fix: F-15585r505102_fix
Add this line to the "httpd.conf" file: Header always edit Set-Cookie ^(.*)$ $1;HttpOnly;secure Add the secure attribute to the JavaScript set cookie: function setCookie() { document.cookie = "ALEPH_SESSION_ID = $SESS; path = /; secure"; } "HttpOnly" cannot be used since by definition this is a cookie set by JavaScript. Restart www_server and Apache.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- AS24-W2-000540
- Vuln IDs
-
- V-214380
- V-92545
- Rule IDs
-
- SV-214380r961122_rule
- SV-102633
Checks: C-15591r277881_chk
Interview the System Administrator for the Apache web server. Ask for documentation on the disaster recovery methods tested and planned for the Apache web server in the event of the necessity for rollback. If documentation for a disaster recovery has not been established, this is a finding.
Fix: F-15589r277882_fix
Prepare documentation for disaster recovery methods for the Apache web server in the event of the necessity for rollback. Document and test the disaster recovery methods designed.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- AS24-W2-000580
- Vuln IDs
-
- V-214382
- V-92549
- Rule IDs
-
- SV-214382r961131_rule
- SV-102637
Checks: C-15593r277887_chk
Determine whether the public web server has a two-way trusted relationship with any private asset located within the network. Private web server resources (e.g., drives, folders, printers, etc.) will not be directly mapped to or shared with public web servers. If sharing is selected for any web folder, this is a finding. If private resources (e.g., drives, partitions, folders/directories, printers, etc.) are shared with the public web server, this is a finding.
Fix: F-15591r277888_fix
Configure the public web server to not have a trusted relationship with any system resource that is also not accessible to the public. Web content is not to be shared via Microsoft shares or NFS mounts.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- AS24-W2-000610
- Vuln IDs
-
- V-214383
- V-92553
- Rule IDs
-
- SV-214383r961167_rule
- SV-102641
Checks: C-15594r277890_chk
Review the DocumentRoot directive in the <'INSTALLED PATH'>\conf\httpd.conf file. Note each location following the "DocumentRoot" string. This is the configured path(s) to the document root directory(s). To view a list of the directories and sub-directories and the file "index.html", from each stated "DocumentRoot" location, enter the following command: dir "index.html" Review the results for each document root directory and its subdirectories. If a directory does not contain an "index.html" or equivalent default document, this is a finding.
Fix: F-15592r277891_fix
Add a default document to the applicable directories.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- AS24-W2-000670
- Vuln IDs
-
- V-214388
- V-92565
- Rule IDs
-
- SV-214388r961278_rule
- SV-102653
Checks: C-15599r277905_chk
Review the <'INSTALLED PATH'>\conf\httpd.conf file. If "IP Address Restrictions" are not configured or IP ranges configured to be "Allow" are not restrictive enough to prevent connections from nonsecure zones, this is a finding.
Fix: F-15597r277906_fix
Configure the "http.conf" file to include restrictions. Example: <RequireAll> Require not host phishers.example.com moreidiots.example </RequireAll>
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- AS24-W2-000690
- Vuln IDs
-
- V-214389
- V-92567
- Rule IDs
-
- SV-214389r961353_rule
- SV-102655
Checks: C-15600r277908_chk
Determine which tool or control file is used to control the configuration of the web server. If the control of the web server is done via control files, verify who has update access to them. If tools are being used to configure the web server, determine who has access to execute the tools. If accounts other than the System Administrator (SA), the Web Manager, or the Web Manager designees have access to the web administration tool or control files, this is a finding.
Fix: F-15598r277909_fix
Restrict access to the web administration tool to only the SA, Web Manager, or the Web Manager designees.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- AS24-W2-000780
- Vuln IDs
-
- V-214390
- V-92573
- Rule IDs
-
- SV-214390r1192950_rule
- SV-102661
Checks: C-15601r1192949_chk
Review the website documentation and deployment configuration to determine which ports and protocols are enabled. Verify the ports and protocols being used are permitted, are necessary for the operation of the web server and the hosted applications, and are secure for a production system. Review both the <'INSTALLED PATH'>\conf\httpd.conf and the <'INSTALLED PATH'>\conf\extra\httpd-ssl.conf files. Verify only the listener for IANA well-known ports for HTTP and HTTPS (80 and 443) are in use. If any of the ports or protocols are not permitted, are nonsecure, or are not necessary for website operation, this is a finding.
Fix: F-15599r277912_fix
Ensure the website enforces the use of IANA well-known ports for HTTP and HTTPS.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- AS24-W2-000870
- Vuln IDs
-
- V-214394
- V-92855
- Rule IDs
-
- SV-214394r961632_rule
- SV-102943
Checks: C-15605r803283_chk
Verify the "session_cookie_module" module is installed. Inspect the httpd.conf file to confirm the "session_cookie_module" is being used. If the "session_cookie_module" module is not being used, this is a finding. Search for the "Session" and "SessionCookieName" directives. If "Session" is not "on" and "SessionCookieName" does not contain "httpOnly" and "secure", this is a finding.
Fix: F-15603r803284_fix
Set "Session" to "on". Ensure the "SessionCookieName" directive includes "httpOnly" and "secure".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- AS24-W2-000880
- Vuln IDs
-
- V-214395
- V-92587
- Rule IDs
-
- SV-214395r961632_rule
- SV-102675
Checks: C-15606r277926_chk
Verify the "mod_session_crypto" module is installed. If the mod_session_crypto module is not being used, this is a finding.
Fix: F-15604r277927_fix
Ensure the "mod_session_crypto" module is installed. Enable encrypted session cookies. Example: Session On SessionCookieName session path=/ SessionCryptoPassphrase secret