Red Hat Ansible Automation Controller Web Server Security Technical Implementation Guide

Description

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].

Details

Version / Release: V1R1

Published: 2023-03-15

Updated At: 2023-05-04 00:37:30

Actions

Download

Filter

Findings
Severity Open Not Reviewed Not Applicable Not a Finding
Overall 0 0 0 0
Low 0 0 0 0
Medium 0 0 0 0
High 0 0 0 0
Drop CKL or SCAP (XCCDF) results here.

    Vuln Rule Version CCI Severity Title Description Status Finding Details Comments
    SV-256940r903545_rule APWS-AT-000020 CCI-000054 MEDIUM The Automation Controller web server must manage sessions. Session management on client and server is required to protect identity and authorization information. Sessions for the Automation Controller web server, if compromised, could lead to execution of jobs on remote endpoints as if authenticated. Satisfies:
    SV-256941r903518_rule APWS-AT-000030 CCI-000068 MEDIUM The Automation Controller servers must use encrypted communication for all channels given the high impact of those services to an organization's infrastructure. The Automation Controller communicates information about configuration of other information systems through its web interface and API, storing records about this information in a database. Although large portions are sanitized of sensitive information, du
    SV-256942r903519_rule APWS-AT-000040 CCI-001453 MEDIUM The Automation Controller NGINX web server must use cryptography on all remote connections. Nondisplayed data on a web page may expose information that could put the organization at risk and negatively affect data integrity. Automation Controller's web server must be configured such that all connections, regardless of their origin, between the
    SV-256943r903546_rule APWS-AT-000090 CCI-000067 MEDIUM The Automation Controller must generate the appropriate log records. Automation Controller's web server must log all details related to user sessions in support of troubleshooting, debugging, and forensic analysis. Without a data logging feature, the organization loses an important auditing and analysis tool for event inv
    SV-256944r902346_rule APWS-AT-000230 CCI-001749 HIGH All Automation Controller NGINX front-end web server files must be verified for their integrity (e.g., checksums and hashes) before becoming part of the production web server. Being able to verify that a patch, upgrade, certificate, etc., being added to the web server is unchanged from the producer of the file is essential for file validation and nonrepudiation of the information. The Automation Controller NGINX web server ho
    SV-256945r903522_rule APWS-AT-000240 CCI-001749 MEDIUM Expansion modules must be fully reviewed, tested, and signed before they can exist on a production Automation Controller NGINX front-end web server. In the case of a production web server, areas for content development and testing will not exist, as this type of content is only permissible on a development website. The process of developing on a functional production website entails a degree of trial
    SV-256946r902352_rule APWS-AT-000250 CCI-000381 MEDIUM All Automation Controller NGINX front-end web servers must not perform user management for hosted applications. Web servers require enterprise-wide user management capability in order to prevent unauthorized access, with features like attempt lockouts and password complexity requirements. Unauthorized access to the web server makes the web server and the organizat
    SV-256947r903554_rule APWS-AT-000270 CCI-000381 MEDIUM All Automation Controller NGINX web servers must not be a proxy server for any process other than the Automation Controller application. The Automation Controller NGINX web server must be primarily a web server or a proxy server but not both, for the same reasons that other multi-use servers are not recommended. Scanning for web servers that will also proxy requests into an otherwise prote
    SV-256948r902358_rule APWS-AT-000290 CCI-000381 MEDIUM All Automation Controller NGINX webserver accounts not utilized by installed features (i.e., tools, utilities, specific services, etc.) must not be created and must be deleted when the web server feature is uninstalled. If web server accounts are not being used, they must be deleted when the web server is uninstalled. This is because the accounts become stale over time and are not tended to. Best practice also dictates that if accounts are not going to be used, they must
    SV-256949r902361_rule APWS-AT-000310 CCI-000381 MEDIUM All Automation Controller NGINX web servers must have Multipurpose Internet Mail Extensions (MIME) that invoke OS shell programs disabled. Controlling what a user of a hosted application can access is part of the security posture of the Automation Controller NGINX web server. Any time a user can access more functionality than is needed for the operation of the hosted application, it poses
    SV-256950r902364_rule APWS-AT-000340 CCI-000381 MEDIUM All Automation Controller NGINX web servers must have Web Distributed Authoring (WebDAV) disabled. Automation Controller NGINX web servers can be installed with functionality that, just by its nature, is not secure. Web Distributed Authoring (WebDAV) is an extension to the HTTP protocol that, when developed, was meant to allow users to create, change,
    SV-256951r902367_rule APWS-AT-000350 CCI-000381 LOW All Automation Controller NGINX web servers must protect system resources and privileged operations from hosted applications. Automation Controller NGINX web servers may host too many applications. Each application will need certain system resources and privileged operations to operate correctly. The Automation Controller NGINX web servers must be configured to contain and contr
    SV-256952r903524_rule APWS-AT-000370 CCI-000382 MEDIUM All Automation Controller NGINX web servers must be configured to use a specified IP address and port. From a security perspective, it is important that all Automation Controller NGINX web servers are configured to use a specified IP address and port because “listening” on all IP addresses poses a vulnerability to the web server. Not confining the web
    SV-256953r903525_rule APWS-AT-000400 CCI-000186 MEDIUM Only authenticated system administrators or the designated PKI Sponsor for an Automation Controller NGINX web server must have access to any Automation Controller NGINX web server's private key. Each Automation Controller NGINX web server's private key is used to prove the identity of the server to clients and securely exchange the shared secret key used to encrypt communications between the Automation Controller NGINX web server and clients. By
    SV-256954r903528_rule APWS-AT-000440 CCI-001082 MEDIUM All Automation Controller NGINX web server accounts accessing the directory tree, the shell, or other operating system functions and utilities must only be administrative accounts. AIT is important to limit access to Automation Controller nginx web servers and provide access on a need-to-know basis. For example, only System Administrators must have access to all the system's capabilities, while the web administrator and associated s
    SV-256955r902379_rule APWS-AT-000480 CCI-001664 MEDIUM Cookies exchanged between any Automation Controller NGINX web server and any client, such as session cookies, must have security settings that disallow cookie access outside the originating Automation Controller NGINX web server and hosted application. It is important that cookies exchanged between any Automation Controller NGINX webserver and any client have security settings that do not allow cookie access outside the originating Automation Controller server and the hosted application. This is because
    SV-256956r903529_rule APWS-AT-000590 CCI-001084 MEDIUM The Automation Controller NGINX web server document directory must be in a separate partition from the web server's system files. It is important that Automation Controller NGINX web server restricts the ability of clients to launch denial-of-service (DoS) attacks against other information systems or networks by disallowing access to system files via document and system file partiti
    SV-256957r903552_rule APWS-AT-000610 CCI-001310 MEDIUM The Automation Controller NGINX web server must limit the character set used for data entry. It is important that Automation Controller NGINX web server limit the character set used for data entry and disallow Unicode use in hosted applications to avoid application compromise. Definition of the available character set for data entry can trap effo
    SV-256958r903555_rule APWS-AT-000620 CCI-001312 MEDIUM The Automation Controller NGINX web server must display a default hosted application web page, not a directory listing, when a requested web page cannot be found. It is important that Automation Controller NGINX web server display a default hosted application web paged and not a directory listing when a requested web page cannot be found, because the web server will be vulnerable to intrusion. For this reason, acce
    SV-256959r902391_rule APWS-AT-000640 CCI-001312 MEDIUM Debugging and trace information, within Automation Controller NGINX web server, used to diagnose the web server must be disabled. It is important that Automation Controller NGINX web server debugging and trace information used to diagnose the web server is disabled, because debugging information can yield information about the Automation Controller NGINX webserver, like web server t
    SV-256960r903547_rule APWS-AT-000700 CCI-001082 MEDIUM Nonprivileged accounts on the hosting system must only access Automation Controller NGINX web server security-relevant information and functions through a distinct administrative account. It is important that Automation Controller NGINX web server security features are separated from nonprivileged users. Special “privileged” roles need to be developed so that only they can have access to those features and administer the web server, wh
    SV-256961r902397_rule APWS-AT-000780 CCI-001813 MEDIUM The Automation Controller NGINX web server application, libraries, and configuration files must only be accessible to privileged users. Automation Controller NGINX web servers can be modified through parameter modification, patch installation, upgrades to the web server or modules, and security parameter changes. With each of these changes, there is the potential for an adverse effect suc
    SV-256962r903550_rule APWS-AT-000830 CCI-002385 MEDIUM The Automation Controller NGINX web server must be protected from being stopped by a nonprivileged user. An attacker has at least two reasons to stop an Automation Controller NGINX web server. The first is to cause a DoS, and the second is to put in place changes the attacker made to an Automation Controller NGINX web server configuration. To prohibit an at
    SV-256963r902403_rule APWS-AT-000850 CCI-002418 MEDIUM The Automation Controller NGINX web server must employ cryptographic mechanisms (TLS/DTLS/SSL) to prevent the unauthorized disclosure of information during transmission. Preventing the disclosure of transmitted information requires that the Automation Controller web server take measures to employ some form of cryptographic mechanism in order to protect the information during transmission. This is usually achieved through
    SV-256964r903551_rule APWS-AT-000900 CCI-002418 MEDIUM Automation Controller NGINX web servers must maintain the confidentiality of controlled information during transmission through the use of an approved TLS version. Transport Layer Security (TLS) is a required transmission protocol for a web server hosting controlled information. The use of TLS provides confidentiality of data in transit between the web server and client. FIPS 140-2 approved TLS versions must be enab
    SV-256965r902409_rule APWS-AT-000920 CCI-002420 MEDIUM The Automation Controller NGINX web servers must maintain the confidentiality and integrity of information during preparation for transmission. Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, including, for example, during aggregation, at protocol transformation points, and during packing/unpacking. These unauthorized disclosures
    SV-256966r903536_rule APWS-AT-000940 CCI-002605 MEDIUM Automation Controller NGINX web servers must install security-relevant software updates within the configured time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs). Security flaws with software applications are discovered daily. Red Hat constantly updates and patches Automation Controller to address newly discovered security vulnerabilities. Organizations (including any contractor to the organization) are required to
    SV-256967r903537_rule APWS-AT-000950 CCI-000366 MEDIUM All accounts installed with the Automation Controller NGINX web server's software and tools must have passwords assigned and default passwords changed. During installation of the Automation Controller NGINX web server software, accounts are created for the web server to operate properly. The accounts installed can have either no password installed or a default password, which will be known and documented