Web Server Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +51 −82 ⚠ 4 ✎ 36
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 51
- V-41611 Medium The web server must initiate session logging upon start up.
- V-41674 Medium The log data and records from the web server must be backed up onto a different system or media.
- V-41807 Medium The web server must generate unique session identifiers that cannot be reliably reproduced.
- V-41808 Medium The web server must generate a session ID long enough that it cannot be guessed through brute force.
- V-41809 Medium The web server must generate a session ID using as much of the character set as possible to reduce the risk of brute force.
- V-41810 Medium The web server must generate unique session identifiers with definable entropy.
- V-41818 Medium The web server must accept only system-generated session identifiers.
- V-41833 Medium The web server must restrict the ability of users to launch Denial of Service (DoS) attacks against other information systems or networks.
- V-55945 Medium The web server must enforce approved authorizations for logical access to hosted applications and resources in accordance with applicable access control policies.
- V-55947 Medium Non-privileged accounts on the hosting system must only access web server security-relevant information and functions through a distinct administrative account.
- V-55949 Medium The web server must set an inactive timeout for sessions.
- V-55951 Medium The web server must set an absolute timeout for sessions.
- V-55953 Medium Remote access to the web server must follow access policy or work in conjunction with enterprise tools designed to enforce policy requirements.
- V-55955 Medium The web server must provide the capability to immediately disconnect or disable remote access to the hosted applications.
- V-55957 Medium A web server that is part of a web server cluster must route all remote management through a centrally managed access control point.
- V-55959 Medium The web server must use a logging mechanism that is configured to allocate log record storage capacity large enough to accommodate the logging requirements of the web server.
- V-55961 Medium The web server must restrict inbound connections from nonsecure zones.
- V-55969 Medium The web server must not impede the ability to write specified log record content to an audit log server.
- V-55971 Medium The web server must be configurable to integrate with an organizations security infrastructure.
- V-55973 Medium The web server must use a logging mechanism that is configured to alert the ISSO and SA in the event of a processing failure.
- V-55975 Medium The web server must use a logging mechanism that is configured to provide a warning to the ISSO and SA when allocated record storage volume reaches 75% of maximum log record storage capacity.
- V-55977 Medium The web server must record time stamps for log records to a minimum granularity of one second.
- V-55979 Medium The web server must generate log records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
- V-55981 Medium The web server application, libraries, and configuration files must only be accessible to privileged users.
- V-55983 Medium All web server files must be verified for their integrity (e.g., checksums and hashes) before becoming part of the production web server.
- V-55985 Medium The web server must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
- V-55987 Medium All accounts installed with the web server software and tools must have passwords assigned and default passwords changed.
- V-55989 Medium The web server must not perform user management for hosted applications.
- V-55991 Medium The web server must prohibit or restrict the use of nonsecure or unnecessary ports, protocols, modules, and/or services.
- V-55993 Medium Anonymous user access to the web server application directories must be prohibited.
- V-55995 Medium Web server accounts accessing the directory tree, the shell, or other operating system functions and utilities must only be administrative accounts.
- V-55997 Medium The web server must be tuned to handle the operational requirements of the hosted application.
- V-55999 Medium The web server must be protected from being stopped by a non-privileged user.
- V-56001 Medium The web server must employ cryptographic mechanisms (TLS/DTLS/SSL) preventing the unauthorized disclosure of information during transmission.
- V-56003 Medium Web server session IDs must be sent to the client using SSL/TLS.
- V-56005 Medium Web server cookies, such as session cookies, sent to the client using SSL/TLS must not be compressed.
- V-56007 Medium Cookies exchanged between the web server and the client, such as session cookies, must have cookie properties set to prohibit client-side scripts from reading the cookie data.
- V-56009 Medium Cookies exchanged between the web server and the client, such as session cookies, must have cookie properties set to force the encryption of cookies.
- V-56011 Medium A web server must maintain the confidentiality of controlled information during transmission through the use of an approved TLS version.
- V-56013 Medium The web server must maintain the confidentiality and integrity of information during preparation for transmission.
- V-56015 Medium The web server must maintain the confidentiality and integrity of information during reception.
- V-56017 Medium The web server must implement required cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance when encrypting data that must be compartmentalized.
- V-56019 Medium A web server utilizing mobile code must meet DoD-defined mobile code requirements.
- V-56021 Medium The web server must invalidate session identifiers upon hosted application user logout or other session termination.
- V-56023 Medium The web server must generate a unique session identifier for each session using a FIPS 140-2 approved random number generator.
- V-56025 Medium Cookies exchanged between the web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating web server and hosted application.
- V-56027 Medium The web server must only accept client certificates issued by DoD PKI or DoD-approved PKI Certification Authorities (CAs).
- V-56029 Medium The web server must augment re-creation to a stable and known baseline.
- V-56031 Medium The web server must encrypt user identifiers and passwords.
- V-56033 Medium The web server must install security-relevant software updates within the configured time period directed by an authoritative source (e.g. IAVM, CTOs, DTMs, and STIGs).
- V-56035 Medium The web server must display a default hosted application web page, not a directory listing, when a requested web page cannot be found.
Removed rules 82
- V-40797 Medium Remote access to the web server must follow access policy or work in conjunction with enterprise tools designed to enforce policy requirements.
- V-40798 Medium The web server must restrict inbound connections from non-secure zones.
- V-40801 Low A web server, that is part of a web server cluster, must route all remote management through a centrally managed access control point.
- V-40806 Medium Privileged users must be the only users with access to change web server content or scripts.
- V-40807 Medium Web server system files must conform to minimum file permission requirements.
- V-40808 Medium Any files used by the web server to store user identifiers and passwords must have proper ownership and permissions that only allow privileged users access.
- V-40809 Medium Cookies exchanged between the web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating web server and hosted application.
- V-40810 Medium Cookies exchanged between the web server and client, such as session cookies, must have the expire attribute set properly.
- V-40818 Low The web server must utilize ports, protocols, and services according to the Ports, Protocols, and Services Management (PPSM) guidelines.
- V-40821 Low The web server must provide automated mechanisms for user account management.
- V-40822 Medium The web server must provide a mechanism to automatically terminate accounts designated as temporary accounts after a defined time period.
- V-40823 Medium The web server must automatically disable accounts after a 35-day period of account inactivity.
- V-40824 Medium The web server must automatically audit account creation.
- V-40827 Medium The web server must monitor for unusual usage of accounts.
- V-40828 Medium The web server must automatically audit account modification.
- V-40829 Medium The web server must automatically audit account-disabling actions and notify appropriate individuals.
- V-40830 Medium The web server must automatically audit account termination and notify appropriate individuals.
- V-40831 Medium The web server must provide a mechanism to automatically terminate accounts designated as emergency accounts after a defined time period.
- V-40832 Medium The web server must notify appropriate individuals when accounts are created.
- V-40833 Medium The web server must notify appropriate individuals when accounts are modified.
- V-40834 Medium The web server must notify appropriate individuals when account-disabling actions are taken.
- V-40835 Medium The web server must notify appropriate individuals when accounts are terminated.
- V-40873 Low A separation of duties for individuals involved in the management of the web server must be documented and implemented.
- V-40874 Medium Non-privileged accounts on the hosting system must only access web server security-relevant information through a distinct administrative account.
- V-40876 High Accounts accessing the directory tree, the shell, or other operating system functions and utilities must only be administrative accounts.
- V-40877 High Anonymous accounts to the web server application directories must be prohibited.
- V-41588 Medium The web server must limit the number of failed login attempts within a defined time period.
- V-41589 Medium The web server must lock an account after a specified number of failed logins.
- V-41590 Medium The web server must enforce a defined time period during which the number of consecutive invalid access attempts by a user is counted.
- V-41594 Low The web server must record the date and time of the last successful logon for each user.
- V-41599 Low Web server configurations, certificates, system files, and any other files deemed important must be protected against an individual falsely denying having performed a particular action.
- V-41602 Medium The web server must generate audit records for the DoD-selected list of auditable events.
- V-41603 Medium The web server must generate audit records from all components, extensions, or plug-ins being utilized by the web server into an audit trail that is time-correlated to within a defined level of tolerance.
- V-41610 Low The web server must provide the capability to remotely view all content related to an established user session in real time.
- V-41618 Low The web server must include DoD-defined additional, detailed information in the audit records for audit events identified by type, location, or subject.
- V-41619 Low The web server must not impede the ability to write specified audit record content to an audit log server.
- V-41625 Medium The web server must use a logging mechanism that is configured to provide a warning when allocated audit record storage volume reaches a defined percentage of maximum audit record storage capacity.
- V-41626 Medium The web server must use a logging mechanism that is configured to provide a real-time alert when organization-defined audit failure events occur.
- V-41669 Medium The web server must synchronize with internal information system clocks which, in turn, are synchronized on a DoD frequency with a DoD authoritative time source.
- V-41681 Medium The web server application, libraries, and configuration files must only be accessible to privileged users.
- V-41697 Medium All accounts installed with the web server software and tools must have passwords assigned and default passwords changed.
- V-41705 Medium The web server must prohibit or restrict the use of non-secure ports, protocols, modules, and/or services in accordance with organizationally defined requirements.
- V-41711 Low The web server software, hosted application software, and licenses must be part of a system backup.
- V-41712 Low The web server must not impede DoD requirements to conduct backups of system-level information contained on the web server.
- V-41713 Low The web server configuration files, user password files, keystore, keys, and certificates must be part of a system backup.
- V-41716 Medium The web server must use secure token authentication for network access to non-privileged accounts.
- V-41728 Medium The web server must support organizational requirements to disable user accounts after an organization-defined time period of inactivity.
- V-41732 Medium The web server must ensure that PKI-based authentication maps the authenticated identity to the user account.
- V-41733 Medium The web server must enforce password complexity by the number of uppercase characters used.
- V-41734 Medium The web server must enforce password complexity by the number of lowercase characters used.
- V-41735 Medium The web server must enforce password complexity by the number of numeric characters used.
- V-41736 Medium The web server must enforce the number of characters that get changed when passwords are changed.
- V-41737 Medium The web server must enforce organizational requirements to enforce password encryption for storage.
- V-41739 Medium The web server must enforce password minimum lifetime restrictions.
- V-41740 Medium The web server must enforce password maximum lifetime restrictions.
- V-41741 Medium The web server must support DoD requirements to prohibit password reuse for the organization-defined number of generations.
- V-41742 Medium The web server must support DoD requirements to enforce minimum password length.
- V-41743 Medium The web server must support DoD requirements to enforce password complexity by the number of special characters used.
- V-41765 Medium The web server must encrypt user identifiers and passwords.
- V-41768 Medium The web server must terminate the network connection associated with a communications session at the end of the session or after a DoD-defined time period of inactivity.
- V-41774 Medium The web server must implement required cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.
- V-41777 Medium A web server hosting publicly available information and applications must be physically and logically isolated.
- V-41778 Medium Public display of web server architecture and settings must be minimized.
- V-41779 Medium A web server hosting controlled access information and applications must be on a separate access-controlled subnet.
- V-41780 Medium A web server hosting controlled access information and applications must not respond to public search engines.
- V-41781 Low The web server must have indexing services turned off or limited to the web content directory.
- V-41782 Medium Session ID storage must be protected from non-privileged users.
- V-41786 Medium The web server must follow the DOD and NSS certificate policies to obtain public key certificates.
- V-41795 Medium The web server must prevent presentation of management-related functionality to non-privileged users.
- V-41801 Medium A web server involved in two-way authentication, such as Mutual SSL Authentication, must ensure the authentication during the entire session.
- V-41813 Medium The web server must display a default web page, not a directory listing, when a requested web page cannot be found.
- V-41831 Medium The web server must be protected from being stopped by a non-privileged user.
- V-41832 Medium The web server must be tuned to handle the operational requirements of the hosted application.
- V-41845 Medium The web server must have security protections in place in the event of a boundary protection device failure.
- V-41846 Medium The web server must employ cryptographic mechanisms (TLS/SSL) preventing the unauthorized disclosure of information during transmission.
- V-41847 Medium Session IDs must be sent to the client using SSL/TLS.
- V-41848 Medium Cookies, such as session cookies, sent to the client using SSL/TLS must not be encrypted and compressed.
- V-41849 Medium Cookies exchanged between the web server and the client, such as session cookies, must have cookie properties set to prohibit client-side scripts from reading the cookie data.
- V-41850 Medium Cookies exchanged between the web server and the client, such as session cookies, must have cookie properties set to force the encryption of cookies.
- V-41853 Low The web server must identify potentially security-relevant error conditions.
- V-41857 Low The web server must alarm and fail to a configurable state, possibly shutting down, in the event of a web server or web server component failure.
- V-41885 Medium The web server must limit the risk of buffer overflows.
Severity changes 4
- V-40799 Low Medium The web server must generate information to be used by external applications or entities to monitor and control remote access.
- V-41684 Low Medium Expansion modules must be fully reviewed, tested, and signed before they can exist on a production web server.
- V-41695 High Medium The web server must provide install options to exclude the installation of documentation, sample code, example applications, and tutorials.
- V-41698 Low Medium The web server must provide install options to exclude installation of utility programs, services, plug-ins, and modules not necessary for operation.
Content changes 36
- V-40791 Medium descriptioncheck The web server must limit the number of allowed simultaneous session requests.
- V-40792 Medium description The web server must perform server-side session management.
- V-40800 Medium descriptioncheckfix The web server must use encryption strength in accordance with the categorization of data hosted by the web server when remote connections are provided.
- V-40819 Medium descriptioncheck The web server must use cryptography to protect the integrity of remote sessions.
- V-41600 Medium descriptioncheckfix The web server must generate, at a minimum, log records for system startup and shutdown, system access, and system authentication events.
- V-41609 Medium description The web server must capture, record, and log all content related to a user session.
- V-41612 Medium descriptioncheckfix The web server must produce log records containing sufficient information to establish what type of events occurred.
- V-41613 Medium descriptioncheck The web server must produce log records containing sufficient information to establish when (date and time) events occurred.
- V-41614 Medium descriptioncheckfix The web server must produce log records containing sufficient information to establish where within the web server the events occurred.
- V-41615 Medium descriptioncheckfix The web server must produce log records containing sufficient information to establish the source of events.
- V-41616 Medium descriptioncheckfix A web server, behind a load balancer or proxy server, must produce log records containing the client IP information as the source and destination and not the load balancer or proxy IP information with each event.
- V-41617 Medium descriptioncheckfix The web server must produce log records that contain sufficient information to establish the outcome (success or failure) of events.
- V-41620 Medium descriptioncheckfix The web server must produce log records containing sufficient information to establish the identity of any user/subject or process associated with an event.
- V-41668 Medium descriptioncheckfix The web server must use the internal system clock to generate time stamps for log records.
- V-41670 Medium descriptioncheckfix Web server log files must only be accessible by privileged users.
- V-41671 Medium descriptioncheckfix The log information from the web server must be protected from unauthorized modification.
- V-41672 Medium descriptioncheckfix The log information from the web server must be protected from unauthorized deletion.
- V-41693 Medium description The web server must only contain services and functions necessary for operation.
- V-41694 Medium fix The web server must not be a proxy server.
- V-41696 Medium description Web server accounts not utilized by installed features (i.e., tools, utilities, specific services, etc.) must not be created and must be deleted when the web server feature is uninstalled.
- V-41699 Medium descriptioncheck The web server must have Multipurpose Internet Mail Extensions (MIME) that invoke OS shell programs disabled.
- V-41700 Medium descriptioncheckfix The web server must allow the mappings to unused and vulnerable scripts to be removed.
- V-41701 Medium descriptioncheck The web server must have resource mappings set to disable the serving of certain file types.
- V-41702 Medium description The web server must have Web Distributed Authoring (WebDAV) disabled.
- V-41704 Medium checkfix Users and scripts running on behalf of users must be contained to the document root or home directory tree of the web server.
- V-41730 Medium descriptioncheckfix The web server must perform RFC 5280-compliant certification path validation.
- V-41731 Medium descriptioncheckfix Only authenticated system administrators or the designated PKI Sponsor for the web server must have access to the web servers private key.
- V-41738 Medium descriptioncheckfix The web server must encrypt passwords during transmission.
- V-41746 Medium description The web server must use cryptographic modules that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.
- V-41811 Medium descriptioncheckfix The web server must be built to fail to a known safe state if system initialization fails, shutdown fails, or aborts fail.
- V-41812 Medium descriptioncheckfix The web server must provide a clustering capability.
- V-41815 Medium description Information at rest must be encrypted using a DoD-accepted algorithm to protect the confidentiality and integrity of the information.
- V-41821 Medium descriptioncheckfix The web server document directory must be in a separate partition from the web servers system files.
- V-41852 Medium description The web server must limit the character set used for data entry.
- V-41854 Medium description Warning and error messages displayed to clients must be modified to minimize the identity of the web server, patches, loaded modules, and directory paths.
- V-41855 Medium descriptioncheck Debugging and trace information used to diagnose the web server must be disabled.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- SRG-APP-000001-WSR-000001
- Vuln IDs
-
- V-40791
- Rule IDs
-
- SV-53018r2_rule
Checks: C-47298r3_chk
Review the web server documentation and configuration to determine if the number of simultaneous sessions is limited. If the parameter is not configured or is unlimited, this is a finding.
Fix: F-45918r3_fix
Configure the web server to limit the number of concurrent sessions.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- SRG-APP-000001-WSR-000002
- Vuln IDs
-
- V-40792
- Rule IDs
-
- SV-53023r2_rule
Checks: C-47329r3_chk
Review the web server documentation and configuration to determine if server-side session management is configured. If it is not configured, this is a finding.
Fix: F-45949r2_fix
Configure the web server to perform server-side session management.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- SRG-APP-000016-WSR-000005
- Vuln IDs
-
- V-40799
- Rule IDs
-
- SV-53035r2_rule
Checks: C-47342r2_chk
Review the web server documentation and configuration to determine if the web server is configured to generate information for external applications monitoring remote access. If a mechanism is not in place providing information to an external application used to monitor and control access, this is a finding.
Fix: F-45961r2_fix
Configure the web server to provide remote connection information to external monitoring and access control applications.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- SRG-APP-000014-WSR-000006
- Vuln IDs
-
- V-40800
- Rule IDs
-
- SV-53037r2_rule
Checks: C-47343r2_chk
Review the web server documentation and configuration to determine the communication methods that are being used. Verify the encryption being used is in accordance with the categorization of data being hosted when remote connections are provided. If it is not, then this is a finding.
Fix: F-45963r2_fix
Configure the web server to use encryption strength equal to the categorization of data hosted when remote connections are provided.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- SRG-APP-000015-WSR-000014
- Vuln IDs
-
- V-40819
- Rule IDs
-
- SV-53068r2_rule
Checks: C-47375r2_chk
Review the web server documentation and configuration to make certain that the web server is configured to use cryptography to protect the integrity of remote access sessions. If the web server is not configured to use cryptography to protect the integrity of remote access sessions, this is a finding.
Fix: F-45994r2_fix
Configure the web server to utilize encryption during remote access sessions.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SRG-APP-000089-WSR-000047
- Vuln IDs
-
- V-41600
- Rule IDs
-
- SV-54177r2_rule
Checks: C-48029r2_chk
Review the web server documentation and the deployed system configuration to determine if, at a minimum, system startup and shutdown, system access, and system authentication events are logged. If the logs do not include the minimum logable events, this is a finding.
Fix: F-47059r3_fix
Configure the web server to generate log records for system startup and shutdown, system access, and system authentication events.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001462
- Version
- SRG-APP-000093-WSR-000053
- Vuln IDs
-
- V-41609
- Rule IDs
-
- SV-54186r2_rule
Checks: C-48038r2_chk
Review the web server documentation and deployed configuration to determine if the web server captures and logs all content related to a user session. Request a user access the hosted applications and verify the complete session is logged. If any of the session is excluded from the log, this is a finding.
Fix: F-47068r2_fix
Configure the web server to capture and log all content related to a user session.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001464
- Version
- SRG-APP-000092-WSR-000055
- Vuln IDs
-
- V-41611
- Rule IDs
-
- SV-54188r2_rule
Checks: C-48040r2_chk
Review the web server documentation and deployed configuration to determine if the web server captures log data as soon as the web server is started. If the web server does not capture logable events upon startup, this is a finding.
Fix: F-47070r2_fix
Configure the web server to capture logable events upon startup.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SRG-APP-000095-WSR-000056
- Vuln IDs
-
- V-41612
- Rule IDs
-
- SV-54189r2_rule
Checks: C-48041r2_chk
Review the web server documentation and deployed configuration to determine if the web server contains sufficient information to establish what type of event occurred. Request a user access the hosted applications, and verify sufficient information is recorded. If sufficient information is not logged, this is a finding.
Fix: F-47071r2_fix
Configure the web server to record sufficient information to establish what type of events occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- SRG-APP-000096-WSR-000057
- Vuln IDs
-
- V-41613
- Rule IDs
-
- SV-54190r2_rule
Checks: C-48042r2_chk
Review the web server documentation and deployment configuration to determine if the web server is configured to generate a date and time for each logged event. Request a user access the hosted application and generate logable events, and then review the logs to determine if the date and time are included in the log event data. If the date and time are not included, this is a finding.
Fix: F-47072r2_fix
Configure the web server to log date and time with the event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-APP-000097-WSR-000058
- Vuln IDs
-
- V-41614
- Rule IDs
-
- SV-54191r2_rule
Checks: C-48043r2_chk
Review the web server documentation and deployment configuration to determine if the web server is configured to generate sufficient information to resolve in which process within the web server the log event occurred. Request a user access the hosted application and generate logable events, and then review the logs to determine if the process of the event within the web server can be established. If it cannot be determined where the event occurred, this is a finding.
Fix: F-47073r2_fix
Configure the web server to generate enough information to determine in what process within the web server the log event occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SRG-APP-000098-WSR-000059
- Vuln IDs
-
- V-41615
- Rule IDs
-
- SV-54192r2_rule
Checks: C-48044r2_chk
Review the web server documentation and deployment configuration to determine if the web server is configured to generate sufficient information to resolve the source, e.g. source IP, of the log event. Request a user access the hosted application and generate logable events, and then review the logs to determine if the source of the event can be established. If the source of the event cannot be determined, this is a finding.
Fix: F-47074r2_fix
Configure the web server to generate the source of each logable event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SRG-APP-000098-WSR-000060
- Vuln IDs
-
- V-41616
- Rule IDs
-
- SV-54193r2_rule
Checks: C-48045r2_chk
Review the deployment configuration to determine if the web server is sitting behind a proxy server. If the web server is not sitting behind a proxy server, this finding is NA. If the web server is behind a proxy server, review the documentation and deployment configuration to determine if the web server is configured to generate sufficient information to resolve the source, e.g. source IP, of the logged event and not the proxy server. Request a user access the hosted application through the proxy server and generate logable events, and then review the logs to determine if the source of the event can be established. If the source of the event cannot be determined, this is a finding.
Fix: F-47075r2_fix
Configure the web server to generate the client source, not the load balancer or proxy server, of each logable event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SRG-APP-000099-WSR-000061
- Vuln IDs
-
- V-41617
- Rule IDs
-
- SV-54194r2_rule
Checks: C-48046r2_chk
Review the web server documentation and deployment configuration to determine if the web server is configured to generate the outcome (success or failure) of the event. Request a user access the hosted application and generate logable events, and then review the logs to determine if the outcome of the event can be established. If the outcome of the event cannot be determined, this is a finding.
Fix: F-47076r2_fix
Configure the web server to generate the outcome, success or failure, as part of each logable event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- SRG-APP-000100-WSR-000064
- Vuln IDs
-
- V-41620
- Rule IDs
-
- SV-54197r2_rule
Checks: C-48049r2_chk
Review the web server documentation and deployment configuration to determine if the web server can generate log data containing the user/subject identity. Request a user access the hosted application and generate logable events, and verify the events contain the user/subject or process identity. If the identity is not part of the log record, this is a finding.
Fix: F-47079r2_fix
Configure the web server to include the user/subject identity or process as part of each log record.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-000159
- Version
- SRG-APP-000116-WSR-000066
- Vuln IDs
-
- V-41668
- Rule IDs
-
- SV-54245r2_rule
Checks: C-48065r2_chk
Review the web server documentation and deployment configuration to determine if the internal system clock is used for date and time stamps. If this is not feasible, an alternative workaround is to take an action that generates an entry in the log and then immediately query the operating system for the current time. A reasonable match between the two times will suffice as evidence that the system is using the internal clock for date and time stamps. If the web server does not use the internal system clock to generate time stamps, this is a finding.
Fix: F-47127r2_fix
Configure the web server to use internal system clocks to generate date and time stamps for log records.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- SRG-APP-000118-WSR-000068
- Vuln IDs
-
- V-41670
- Rule IDs
-
- SV-54247r2_rule
Checks: C-48067r2_chk
Review the web server documentation and deployed configuration settings to determine if the web server logging features protect log information from unauthorized access. Review file system settings to verify the log files have secure file permissions. If the web server log files are not protected from unauthorized access, this is a finding.
Fix: F-47129r2_fix
Configure the web server log files so unauthorized access of log information is not possible.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- SRG-APP-000119-WSR-000069
- Vuln IDs
-
- V-41671
- Rule IDs
-
- SV-54248r2_rule
Checks: C-48068r2_chk
Review the web server documentation and deployed configuration settings to determine if the web server logging features protect log information from unauthorized modification. Review file system settings to verify the log files have secure file permissions. If the web server log files are not protected from unauthorized modification, this is a finding.
Fix: F-47130r3_fix
Configure the web server log files so unauthorized modification of log information is not possible.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- SRG-APP-000120-WSR-000070
- Vuln IDs
-
- V-41672
- Rule IDs
-
- SV-54249r2_rule
Checks: C-48069r2_chk
Review the web server documentation and deployed configuration settings to determine if the web server logging features protect log information from unauthorized deletion. Review file system settings to verify the log files have secure file permissions. If the web server log files are not protected from unauthorized deletion, this is a finding.
Fix: F-47131r2_fix
Configure the web server log files so unauthorized deletion of log information is not possible.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001348
- Version
- SRG-APP-000125-WSR-000071
- Vuln IDs
-
- V-41674
- Rule IDs
-
- SV-54251r2_rule
Checks: C-48071r3_chk
Review the web server documentation and deployed configuration to determine if the web server log records are backed up onto an unrelated system or media than the system being logged. If the web server logs are not backed up onto a different system or media than the system being logged, this is a finding.
Fix: F-47133r3_fix
Configure the web server logs to be backed up onto a different system or media other than the system being logged.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- SRG-APP-000131-WSR-000073
- Vuln IDs
-
- V-41684
- Rule IDs
-
- SV-54261r2_rule
Checks: C-48081r2_chk
Review the web server documentation and configuration to determine if web server modules are fully tested before implementation in the production environment. Review the web server for modules identified as test, debug, or backup and that cannot be reached through the hosted application. Review the web server to see if the web server or an external utility is in use to enforce the signing of modules before they are put into a production environment. If development and testing is taking place on the production web server or modules are put into production without being signed, this is a finding.
Fix: F-47143r2_fix
Configure the web server to enforce, internally or through an external utility, the review, testing and signing of modules before implementation into the production environment.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000075
- Vuln IDs
-
- V-41693
- Rule IDs
-
- SV-54270r2_rule
Checks: C-48090r2_chk
Review the web server documentation and deployed configuration to determine if web server features, services, and processes are installed that are not needed for hosted application deployment. If excessive features, services, and processes are installed, this is a finding.
Fix: F-47152r2_fix
Uninstall or deactivate features, services, and processes not needed by the web server for operation.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000076
- Vuln IDs
-
- V-41694
- Rule IDs
-
- SV-54271r2_rule
Checks: C-48091r2_chk
Review the web server documentation and deployed configuration to determine if the web server is also a proxy server. If the web server is also acting as a proxy server, this is a finding.
Fix: F-47153r3_fix
Uninstall any proxy services, modules, and libraries that are used by the web server to act as a proxy server. Verify all configuration changes are made to assure the web server is no longer acting as a proxy server in any manner.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000077
- Vuln IDs
-
- V-41695
- Rule IDs
-
- SV-54272r2_rule
Checks: C-48092r2_chk
Review the web server documentation and deployment configuration to determine if the web server contains documentation, sample code, example applications, or tutorials. Verify the web server install process also offers an option to exclude these elements from installation and provides an uninstall option for their removal. If web server documentation, sample code, example applications, or tutorials are installed or the web server install process does not offer an option to exclude these elements from installation, this is a finding.
Fix: F-47154r2_fix
Use the web server uninstall facility or manually remove any documentation, sample code, example applications, and tutorials.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000078
- Vuln IDs
-
- V-41696
- Rule IDs
-
- SV-54273r2_rule
Checks: C-48093r2_chk
Review the web server documentation to determine the user accounts created when particular features are installed. Verify the deployed configuration to determine which features are installed with the web server. If any accounts exist that are not used by the installed features, this is a finding.
Fix: F-47155r2_fix
Use the web server uninstall facility or manually remove the user accounts not used by the installed web server features.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000080
- Vuln IDs
-
- V-41698
- Rule IDs
-
- SV-54275r2_rule
Checks: C-48095r3_chk
Review the web server documentation and deployment configuration to determine which web server utilities, services, and modules are installed. Verify these options are essential to the operation of the web server. Also, confirm the web server install process offers an option to exclude these utilities, services, and modules from installation that are not needed for operation and that there is an uninstall option for their removal. If there are more utilities, services, or modules installed than are needed for the operation of the web server or the web server does not provide an install facility to customize installation, this is a finding.
Fix: F-47157r2_fix
Use the web server uninstall facility or manually remove any utility programs, services, or modules not needed by the web server for operation.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000081
- Vuln IDs
-
- V-41699
- Rule IDs
-
- SV-54276r2_rule
Checks: C-48096r2_chk
Review the web server documentation and deployment configuration to determine if the OS shell is accessible by any MIME types that are enabled. If a user of the web server can invoke OS shell programs, this is a finding.
Fix: F-47158r2_fix
Configure the web server to disable all MIME types that invoke OS shell programs.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000082
- Vuln IDs
-
- V-41700
- Rule IDs
-
- SV-54277r2_rule
Checks: C-48097r2_chk
Review the web server documentation and deployment configuration to determine what script mappings are available. Review the scripts used by the web server and the hosted applications. If there are script mappings in use that are not used by the web server or hosted applications for operation, this is a finding.
Fix: F-47159r2_fix
Remove script mappings that are not needed for web server and hosted application operation.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000083
- Vuln IDs
-
- V-41701
- Rule IDs
-
- SV-54278r2_rule
Checks: C-48098r2_chk
Review the web server documentation and deployment configuration to determine what types of files are being used for the hosted applications. If the web server is configured to allow other file types not associated with the hosted application, especially those associated with logs, configuration files, passwords, etc., this is a finding.
Fix: F-47160r2_fix
Configure the web server to only serve file types to the user that are needed by the hosted applications. All other file types must be disabled.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000085
- Vuln IDs
-
- V-41702
- Rule IDs
-
- SV-54279r2_rule
Checks: C-48099r2_chk
Review the web server documentation and deployment configuration to determine if Web Distributed Authoring (WebDAV) is enabled. If WebDAV is enabled, this is a finding.
Fix: F-47161r2_fix
Configure the web server to disable Web Distributed Authoring.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000086
- Vuln IDs
-
- V-41703
- Rule IDs
-
- SV-54280r2_rule
Checks: C-48100r2_chk
Review the web server documentation and configuration to determine the access to server resources given to hosted applications. If hosted applications have access to more system resources than needed for operation, this is a finding.
Fix: F-47162r2_fix
Configure the privileges given to hosted applications to the minimum required for application operation.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000087
- Vuln IDs
-
- V-41704
- Rule IDs
-
- SV-54281r2_rule
Checks: C-48101r3_chk
Review the web server documentation and configuration to determine where the document root or home directory for each application hosted by the web server is located. Verify that users of the web server applications, and any scripts running on the user's behalf, are contained to each application's domain. If users of the web server applications, and any scripts running on the user's behalf, are not contained, this is a finding.
Fix: F-47163r2_fix
Configure the web server to contain users and scripts to each hosted application's domain.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- SRG-APP-000142-WSR-000089
- Vuln IDs
-
- V-41706
- Rule IDs
-
- SV-54283r2_rule
Checks: C-48103r2_chk
Review the web server documentation and deployment configuration to determine whether the web server is configured to listen on a specified IP address and port. Request a client user try to access the web server on any other available IP addresses on the hosting hardware. If an IP address is not configured on the web server or a client can reach the web server on other IP addresses assigned to the hosting hardware, this is a finding.
Fix: F-47165r2_fix
Configure the web server to only listen on a specified IP address and port.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- SRG-APP-000175-WSR-000095
- Vuln IDs
-
- V-41730
- Rule IDs
-
- SV-54307r2_rule
Checks: C-48127r2_chk
Review the web server documentation and deployed configuration to determine whether the web server provides PKI functionality that validates certification paths in accordance with RFC 5280. If PKI is not being used, this is NA. If the web server is using PKI, but it does not perform this requirement, this is a finding.
Fix: F-47189r4_fix
Configure the web server to validate certificates in accordance with RFC 5280.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- SRG-APP-000176-WSR-000096
- Vuln IDs
-
- V-41731
- Rule IDs
-
- SV-54308r2_rule
Checks: C-48128r2_chk
If the web server does not have a private key, this is N/A. Review the web server documentation and deployed configuration to determine whether only authenticated system administrators and the designated PKI Sponsor for the web server can access the web server private key. If the private key is accessible by unauthenticated or unauthorized users, this is a finding.
Fix: F-47190r2_fix
Configure the web server to ensure only authenticated and authorized users can access the web server's private key.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- SRG-APP-000172-WSR-000104
- Vuln IDs
-
- V-41738
- Rule IDs
-
- SV-54315r2_rule
Checks: C-48135r2_chk
Review the web server documentation and deployed configuration to determine whether passwords are being passed to or from the web server. If the transmission of passwords is not encrypted, this is a finding.
Fix: F-47197r2_fix
Configure the web server to encrypt the transmission passwords.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- SRG-APP-000179-WSR-000110
- Vuln IDs
-
- V-41745
- Rule IDs
-
- SV-54322r2_rule
Checks: C-48142r2_chk
Review web server documentation and deployed configuration to determine whether the encryption modules utilized for storage of data are FIPS 140-2 compliant. Reference the following NIST site to identify validated encryption modules: http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm If the encryption modules used for storage of data are not FIPS 140-2 validated, this is a finding.
Fix: F-47204r2_fix
Configure the web server to utilize FIPS 140-2 approved encryption modules when the web server is storing data.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- SRG-APP-000179-WSR-000111
- Vuln IDs
-
- V-41746
- Rule IDs
-
- SV-54323r2_rule
Checks: C-48143r2_chk
Review web server documentation and deployed configuration to determine whether the encryption modules utilized for authentication are FIPS 140-2 compliant. Reference the following NIST site to identify validated encryption modules: http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm If the encryption modules used for authentication are not FIPS 140-2 validated, this is a finding.
Fix: F-47205r2_fix
Configure the web server to utilize FIPS 140-2 approved encryption modules when authenticating users and processes.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- SRG-APP-000211-WSR-000129
- Vuln IDs
-
- V-41794
- Rule IDs
-
- SV-54371r2_rule
Checks: C-48182r2_chk
Review the web server documentation and deployed configuration to determine whether hosted application functionality is separated from web server management functions. If the functions are not separated, this is a finding.
Fix: F-47253r2_fix
Configure the web server to separate the hosted applications from web server management functionality.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001188
- Version
- SRG-APP-000224-WSR-000136
- Vuln IDs
-
- V-41807
- Rule IDs
-
- SV-54384r2_rule
Checks: C-48195r2_chk
Review the web server documentation and deployed configuration to verify that random and unique session identifiers are generated. Access the web server ID generator function and generate two IDs using the same input. If the web server is not configured to generate random and unique session identifiers, or the ID generator generates the same ID for the same input, this is a finding.
Fix: F-47266r2_fix
Configure the web server to generate random and unique session identifiers that cannot be reliably reproduced.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001188
- Version
- SRG-APP-000224-WSR-000137
- Vuln IDs
-
- V-41808
- Rule IDs
-
- SV-54385r2_rule
Checks: C-48196r2_chk
Review the web server documentation and deployed configuration to see how long the generated session identifiers are. If the web server is not configured to generate session identifiers that are at least 128 bits (16 bytes) in length, this is a finding.
Fix: F-47267r2_fix
Configure the web server to generate session identifiers that are at least 128 bits in length.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001188
- Version
- SRG-APP-000224-WSR-000138
- Vuln IDs
-
- V-41809
- Rule IDs
-
- SV-54386r2_rule
Checks: C-48197r2_chk
Review the web server documentation and deployed configuration to determine what characters are used in generating session IDs. If the web server is not configured to use at least A-Z, a-z, and 0-9 to generate session identifiers, this is a finding.
Fix: F-47268r2_fix
Configure the web server to use at least A-Z, a-z, and 0-9 to generate session IDs.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001188
- Version
- SRG-APP-000224-WSR-000139
- Vuln IDs
-
- V-41810
- Rule IDs
-
- SV-54387r2_rule
Checks: C-48198r3_chk
Review the web server documentation and deployed configuration to verify that the web server is generating random session IDs with entropy equal to at least half the session ID length. If the web server is not configured to generate random session IDs with the proper amount of entropy, this is a finding.
Fix: F-47269r2_fix
Configure the web server to generate random session IDs with minimum entropy equal to half the session ID length.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-APP-000225-WSR-000140
- Vuln IDs
-
- V-41811
- Rule IDs
-
- SV-54388r2_rule
Checks: C-48199r2_chk
Review the web server documentation, deployed configuration, and risk analysis documentation to determine whether the web server will fail to known states for system initialization, shutdown, or abort failures. If the web server will not fail to known state, this is a finding.
Fix: F-47270r3_fix
Configure the web server to fail to the states of operation during system initialization, shutdown, or abort failures found in the risk analysis.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-APP-000225-WSR-000141
- Vuln IDs
-
- V-41812
- Rule IDs
-
- SV-54389r2_rule
Checks: C-48200r2_chk
Review the web server documentation, deployed configuration, and risk analysis documentation to verify that the web server is configured to provide clustering functionality, if the web server is a high-availability web server. If the web server is not a high-availability web server, this finding is NA. If the web server is not configured to provide clustering or some form of failover functionality and the web server is a high-availability server, this is a finding.
Fix: F-47271r2_fix
Configure the web server to provide application failover, or participate in a web cluster that provides failover for high-availability web servers.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- SRG-APP-000231-WSR-000144
- Vuln IDs
-
- V-41815
- Rule IDs
-
- SV-54392r2_rule
Checks: C-48203r2_chk
Review the web server documentation and deployed configuration to locate where potential data at rest is stored. Verify that the data is encrypted using a DoD-accepted algorithm to protect the confidentiality and integrity of the information. If the data is not encrypted using a DoD-accepted algorithm, this is a finding.
Fix: F-47274r2_fix
Use a DoD-accepted algorithm to encrypt data at rest to protect the information's confidentiality and integrity.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001664
- Version
- SRG-APP-000223-WSR-000145
- Vuln IDs
-
- V-41818
- Rule IDs
-
- SV-54395r2_rule
Checks: C-48206r2_chk
Review the web server documentation and deployed configuration to determine whether the web server accepts session IDs that are not system-generated. If the web server does accept non-system-generated session IDs, this is a finding.
Fix: F-47277r3_fix
Configure the web server to only accept session IDs that are created by the web server.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- SRG-APP-000233-WSR-000146
- Vuln IDs
-
- V-41821
- Rule IDs
-
- SV-54398r2_rule
Checks: C-48209r2_chk
Review the web server documentation and deployed configuration to determine where the document directory is located for each hosted application. If the document directory is not in a separate partition from the web server's system files, this is a finding.
Fix: F-47280r2_fix
Configure the web server to place the document directories in a separate partition from the web server system files.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- SRG-APP-000246-WSR-000149
- Vuln IDs
-
- V-41833
- Rule IDs
-
- SV-54410r2_rule
Checks: C-48221r2_chk
Review the web server documentation and deployed configuration to determine whether the web server has been configured to limit the ability of the web server to be used in a DoS attack. If not, this is a finding.
Fix: F-47292r2_fix
Configure the web server to limit the ability of users to use the web server in a DoS attack.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- SRG-APP-000251-WSR-000157
- Vuln IDs
-
- V-41852
- Rule IDs
-
- SV-54429r2_rule
Checks: C-48240r2_chk
Review the web server documentation and deployed configuration to determine what the data set is for data entry. If the web server does not limit the data set used for data entry, this is a finding.
Fix: F-47311r2_fix
Configure the web server to only accept the character sets expected by the hosted applications.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- SRG-APP-000266-WSR-000159
- Vuln IDs
-
- V-41854
- Rule IDs
-
- SV-54431r2_rule
Checks: C-48242r2_chk
Review the web server documentation and deployed configuration to determine whether the web server offers different modes of operation that will minimize the identity of the web server, patches, loaded modules, and directory paths given to clients on error conditions. If the web server is not configured to minimize the information given to clients, this is a finding.
Fix: F-47313r2_fix
Configure the web server to minimize the information provided to the client in warning and error messages.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- SRG-APP-000266-WSR-000160
- Vuln IDs
-
- V-41855
- Rule IDs
-
- SV-54432r2_rule
Checks: C-48243r3_chk
Review the web server documentation and deployed configuration to determine if debugging and trace information are enabled. If the web server is configured with debugging and trace information enabled, this is a finding.
Fix: F-47314r2_fix
Configure the web server to minimize the information given to clients on error conditions by disabling debugging and trace information.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- SRG-APP-000033-WSR-000169
- Vuln IDs
-
- V-55945
- Rule IDs
-
- SV-70199r1_rule
Checks: C-56515r2_chk
The web server must be configured to perform an authorization check to verify that the authenticated entity should be granted access to the requested content. If the web server does not verify that the authenticated entity is authorized to access the requested content prior to granting access, this is a finding.
Fix: F-60823r1_fix
Configure the web server to validate the authenticated entity's authorization to access requested content prior to granting access.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- SRG-APP-000340-WSR-000029
- Vuln IDs
-
- V-55947
- Rule IDs
-
- SV-70201r1_rule
Checks: C-56517r2_chk
Review the web server documentation and configuration to determine if accounts used for administrative duties of the web server are separated from non-privileged accounts. If non-privileged accounts can access web server security-relevant information, this is a finding.
Fix: F-60825r1_fix
Set up accounts and roles that can be used to perform web server security-relevant tasks and remove or modify non-privileged account access to security-relevant tasks.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- SRG-APP-000295-WSR-000134
- Vuln IDs
-
- V-55949
- Rule IDs
-
- SV-70203r1_rule
Checks: C-56519r2_chk
Review the hosted applications, web server documentation and deployed configuration to verify that the web server will close an open session after a configurable time of inactivity. If the web server does not close sessions after a configurable time of inactivity or the amount of time is configured higher than 5 minutes for high-risk applications, 10 minutes for medium-risk applications, or 20 minutes for low-risk applications, this is a finding.
Fix: F-60827r1_fix
Configure the web server to close inactive sessions after 5 minutes for high-risk applications, 10 minutes for medium-risk applications, or 20 minutes for low-risk applications.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- SRG-APP-000295-WSR-000012
- Vuln IDs
-
- V-55951
- Rule IDs
-
- SV-70205r1_rule
Checks: C-56521r2_chk
Review the web server documentation and deployed configuration to verify that the web server is configured to close sessions after an absolute period of time. If the web server is not configured to close sessions after an absolute period of time, this is a finding.
Fix: F-60829r1_fix
Configure the web server to close sessions after an absolute period of time.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- SRG-APP-000315-WSR-000003
- Vuln IDs
-
- V-55953
- Rule IDs
-
- SV-70207r1_rule
Checks: C-56523r2_chk
Review the web server product documentation and deployed configuration to determine if the server or an enterprise tool is enforcing the organization's requirements for remote connections. If the web server is not configured to enforce these requirements and an enterprise tool is not in place, this is a finding.
Fix: F-60831r2_fix
Configure the web server to enforce the remote access policy or to work with an enterprise tool designed to enforce the policy.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002322
- Version
- SRG-APP-000316-WSR-000170
- Vuln IDs
-
- V-55955
- Rule IDs
-
- SV-70209r1_rule
Checks: C-56525r2_chk
Review the web server documentation and configuration to make certain that the web server is configured to allow for the immediate disconnection or disabling of remote access to hosted applications when necessary. If the web server is not capable of or cannot be configured to disconnect or disable remote access to the hosted applications when necessary, this is a finding.
Fix: F-60833r1_fix
Configure the web server to provide the capability to immediately disconnect or disable remote access to the hosted applications.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001844
- Version
- SRG-APP-000356-WSR-000007
- Vuln IDs
-
- V-55957
- Rule IDs
-
- SV-70211r1_rule
Checks: C-56527r2_chk
Review the web server documentation and configuration to determine if the web server is part of a cluster. If the web server is not part of a cluster, then this is NA. If the web server is part of a cluster and is not centrally managed, then this is a finding.
Fix: F-60835r1_fix
Configure the web server to be centrally managed.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- SRG-APP-000357-WSR-000150
- Vuln IDs
-
- V-55959
- Rule IDs
-
- SV-70213r1_rule
Checks: C-56529r2_chk
Review the web server documentation and deployment configuration to determine if the web server is using a logging mechanism to store log records. If a logging mechanism is in use, validate that the mechanism is configured to use record storage capacity in accordance with specifications within NIST SP 800-92 for log record storage requirements. If the web server is not using a logging mechanism, or if the mechanism has not been configured to allocate log record storage capacity in accordance with NIST SP 800-92, this is a finding.
Fix: F-60837r1_fix
Configure the web server to use a logging mechanism that is configured to allocate log record storage capacity in accordance with NIST SP 800-92 log record storage requirements.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- SRG-APP-000315-WSR-000004
- Vuln IDs
-
- V-55961
- Rule IDs
-
- SV-70215r1_rule
Checks: C-56531r2_chk
Review the web server configuration to verify that the web server is restricting access from nonsecure zones. If the web server is not configured to restrict access from nonsecure zones, then this is a finding.
Fix: F-60839r1_fix
Configure the web server to block access from DoD-defined nonsecure zones.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-APP-000358-WSR-000063
- Vuln IDs
-
- V-55969
- Rule IDs
-
- SV-70223r1_rule
Checks: C-56539r2_chk
Review the web server documentation and deployment configuration to determine if the web server can write log data to, or if log data can be transferred to, a separate audit server. Request a user access the hosted application and generate logable events and verify the data is written to a separate audit server. If logs cannot be directly written or transferred on request or on a periodic schedule to an audit log server, this is a finding.
Fix: F-60847r1_fix
Configure the web server to directly write or transfer the logs to a remote audit log server.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-APP-000358-WSR-000163
- Vuln IDs
-
- V-55971
- Rule IDs
-
- SV-70225r1_rule
Checks: C-56541r2_chk
Review the web server documentation and deployed configuration to determine whether the web server is logging security-relevant events. Determine whether there is a security tool in place that allows review and alert capabilities and whether the web server is sending events to this system. If the web server is not, this is a finding.
Fix: F-60849r1_fix
Configure the web server to send logged events to the organization's security infrastructure tool that offers review and alert capabilities.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000139
- Version
- SRG-APP-000108-WSR-000166
- Vuln IDs
-
- V-55973
- Rule IDs
-
- SV-70227r1_rule
Checks: C-56543r2_chk
Review the web server documentation and deployment configuration settings to determine if the web server logging system provides an alert to the ISSO and the SA at a minimum when a processing failure occurs. If alerts are not sent or the web server is not configured to use a dedicated logging tool that meets this requirement, this is a finding.
Fix: F-60851r2_fix
Configure the web server to provide an alert to the ISSO and SA when log processing failures occur. If the web server cannot generate alerts, utilize an external logging system that meets this criterion.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- SRG-APP-000359-WSR-000065
- Vuln IDs
-
- V-55975
- Rule IDs
-
- SV-70229r1_rule
Checks: C-56545r2_chk
Review the web server documentation and deployment configuration settings to determine if the web server log system provides a warning to the ISSO and SA when allocated record storage volume reaches 75% of maximum record storage capacity. If designated alerts are not sent or the web server is not configured to use a dedicated log tool that meets this requirement, this is a finding.
Fix: F-60853r1_fix
Configure the web server to provide a warning to the ISSO and SA when allocated log record storage volume reaches 75% of maximum record storage capacity.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001889
- Version
- SRG-APP-000375-WSR-000171
- Vuln IDs
-
- V-55977
- Rule IDs
-
- SV-70231r1_rule
Checks: C-56547r2_chk
Review the web server documentation and configuration to determine if log records are time stamped to a minimum granularity of one second. Have a user generate a logable event and review the log data to determine if the web server is configured correctly. If the log data does not contain a time stamp to a minimum granularity of one second, this is a finding.
Fix: F-60855r1_fix
Configure the web server to record log events with a time stamp to a granularity of one second.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001890
- Version
- SRG-APP-000374-WSR-000172
- Vuln IDs
-
- V-55979
- Rule IDs
-
- SV-70233r1_rule
Checks: C-56549r2_chk
Review the web server documentation and configuration to determine the time stamp format for log data. If the time stamp is not mapped to UTC or GMT time, this is a finding.
Fix: F-60857r1_fix
Configure the web server to store log data time stamps in a format that is mapped to UTC or GMT time.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- SRG-APP-000380-WSR-000072
- Vuln IDs
-
- V-55981
- Rule IDs
-
- SV-70235r1_rule
Checks: C-56551r2_chk
Review the web server documentation and configuration to determine if the web server provides unique account roles specifically for the purposes of segmenting the responsibilities for managing the web server. Log into the hosting server using a web server role with limited permissions (e.g., Auditor, Developer, etc.) and verify the account is not able to perform configuration changes that are not related to that role. If roles are not defined with limited permissions and restrictions, this is a finding.
Fix: F-60859r2_fix
Define roles and responsibilities to be used when managing the web server. Configure the hosting system to utilize specific roles that restrict access related to web server system and configuration changes.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- SRG-APP-000131-WSR-000051
- Vuln IDs
-
- V-55983
- Rule IDs
-
- SV-70237r1_rule
Checks: C-56553r2_chk
Review the web server documentation and deployment configuration to determine if the web server validates files before the files are implemented into the running configuration. If the web server does not meet this requirement and an external facility is not available for use, this is a finding.
Fix: F-60861r1_fix
Configure the web server to verify object integrity before becoming part of the production web server or utilize an external tool designed to meet this requirement.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-WSR-000174
- Vuln IDs
-
- V-55985
- Rule IDs
-
- SV-70239r1_rule
Checks: C-56555r2_chk
Review the web server documentation and deployed configuration to determine if web server is configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance. If the web server is not configured according to the guidance, this is a finding.
Fix: F-60863r1_fix
Configure the web server to be configured according to DoD security configuration guidance.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-WSR-000079
- Vuln IDs
-
- V-55987
- Rule IDs
-
- SV-70241r1_rule
Checks: C-56557r2_chk
Review the web server documentation and deployment configuration to determine what non-service/system accounts were installed by the web server installation process. Verify the passwords for these accounts have been set and/or changed from the default passwords. If these accounts still have no password or default passwords, this is a finding.
Fix: F-60865r1_fix
Set passwords for non-service/system accounts containing no passwords and change the passwords for accounts which still have default passwords.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000015
- Vuln IDs
-
- V-55989
- Rule IDs
-
- SV-70243r1_rule
Checks: C-56559r2_chk
Review the web server documentation and configuration to determine if the web server is being used as a user management application. If the web server is being used to perform user management for the hosted applications, this is a finding.
Fix: F-60867r1_fix
Configure the web server to disable user management functionality.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- SRG-APP-000383-WSR-000175
- Vuln IDs
-
- V-55991
- Rule IDs
-
- SV-70245r1_rule
Checks: C-56561r2_chk
Review the web server documentation and deployment configuration to determine which ports and protocols are enabled. Verify that the ports and protocols being used are permitted, necessary for the operation of the web server and the hosted applications and are secure for a production system. If any of the ports or protocols are not permitted, are nonsecure or are not necessary for web server operation, this is a finding.
Fix: F-60869r1_fix
Configure the web server to disable any ports or protocols that are not permitted, are nonsecure for a production web server or are not necessary for web server operation.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- SRG-APP-000211-WSR-000031
- Vuln IDs
-
- V-55993
- Rule IDs
-
- SV-70247r1_rule
Checks: C-56563r2_chk
Review the web server documentation and configuration to determine if anonymous users can make changes to the web server or any applications hosted by the web server. If anonymous users can make changes, this is a finding.
Fix: F-60871r1_fix
Configure the web server to not allow anonymous users to change the web server or any hosted applications.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- SRG-APP-000211-WSR-000030
- Vuln IDs
-
- V-55995
- Rule IDs
-
- SV-70249r1_rule
Checks: C-56565r2_chk
Review the web server documentation and configuration to determine what web server accounts are available on the hosting server. If non-privileged web server accounts are available with access to functions, directories, or files not needed for the role of the account, this is a finding.
Fix: F-60873r1_fix
Limit the functions, directories, and files that are accessible by each account and role to administrative accounts and remove or modify non-privileged account access.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-APP-000435-WSR-000148
- Vuln IDs
-
- V-55997
- Rule IDs
-
- SV-70251r1_rule
Checks: C-56567r2_chk
Review the web server documentation and deployed configuration to determine what parameters are set to tune the web server. Review the hosted applications along with risk analysis documents to determine the expected user traffic. If the web server has not been tuned to avoid a DoS, this is a finding.
Fix: F-60875r2_fix
Analyze the expected user traffic for the hosted applications. Tune the web server to avoid a DoS condition under normal user traffic to the hosted applications.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-APP-000435-WSR-000147
- Vuln IDs
-
- V-55999
- Rule IDs
-
- SV-70253r1_rule
Checks: C-56569r2_chk
Review the web server documentation and deployed configuration to determine where the process ID is stored and which utilities are used to start/stop the web server. Determine whether the process ID and the utilities are protected from non-privileged users. If they are not protected, this is a finding.
Fix: F-60877r1_fix
Remove or modify non-privileged account access to the web server process ID and the utilities used for starting/stopping the web server.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-APP-000439-WSR-000151
- Vuln IDs
-
- V-56001
- Rule IDs
-
- SV-70255r1_rule
Checks: C-56571r2_chk
Review the web server documentation and deployed configuration to determine whether the transmission of data between the web server and external devices is encrypted. If the web server does not encrypt the transmission, this is a finding.
Fix: F-60879r1_fix
Configure the web server to encrypt the transmission of data between the web server and external devices.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-APP-000439-WSR-000152
- Vuln IDs
-
- V-56003
- Rule IDs
-
- SV-70257r1_rule
Checks: C-56573r2_chk
Review the web server documentation and deployed configuration to determine whether the session identifier is being sent to the client encrypted. If the web server does not encrypt the session identifier, this is a finding.
Fix: F-60881r1_fix
Configure the web server to encrypt the session identifier for transmission to the client.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-APP-000439-WSR-000153
- Vuln IDs
-
- V-56005
- Rule IDs
-
- SV-70259r1_rule
Checks: C-56575r2_chk
Review the web server documentation and deployed configuration to determine whether cookies are being sent to the client using SSL/TLS. If the transmission is through a SSL/TLS connection, but the cookie is not being compressed, this finding is NA. If the web server is using SSL/TLS for cookie transmission and the cookie is also being compressed, this is a finding.
Fix: F-60883r1_fix
Configure the web server to send the cookie to the client via SSL/TLS without using cookie compression.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-APP-000439-WSR-000154
- Vuln IDs
-
- V-56007
- Rule IDs
-
- SV-70261r1_rule
Checks: C-56577r2_chk
Review the web server documentation and deployed configuration to determine how to disable client-side scripts from reading cookies. If the web server is not configured to disallow client-side scripts from reading cookies, this is a finding.
Fix: F-60885r1_fix
Configure the web server to disallow client-side scripts the capability of reading cookie information.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-APP-000439-WSR-000155
- Vuln IDs
-
- V-56009
- Rule IDs
-
- SV-70263r1_rule
Checks: C-56579r2_chk
Review the web server documentation and deployed configuration to verify that cookies are encrypted before transmission. If the web server is not configured to encrypt cookies, this is a finding.
Fix: F-60887r1_fix
Configure the web server to encrypt cookies before transmission.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-APP-000439-WSR-000156
- Vuln IDs
-
- V-56011
- Rule IDs
-
- SV-70265r1_rule
Checks: C-56581r2_chk
Review the web server documentation and deployed configuration to determine which version of TLS is being used. If the TLS version is not an approved version according to NIST SP 800-52 or non-FIPS-approved algorithms are enabled, this is a finding.
Fix: F-60889r1_fix
Configure the web server to use an approved TLS version according to NIST SP 800-52 and to disable all non-approved versions.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002420
- Version
- SRG-APP-000441-WSR-000181
- Vuln IDs
-
- V-56013
- Rule IDs
-
- SV-70267r1_rule
Checks: C-56583r2_chk
Review the web server documentation and deployed configuration to determine if the web server maintains the confidentiality and integrity of information during preparation before transmission. If the confidentiality and integrity are not maintained, this is a finding.
Fix: F-60891r1_fix
Configure the web server to maintain the confidentiality and integrity of information during preparation for transmission.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002422
- Version
- SRG-APP-000442-WSR-000182
- Vuln IDs
-
- V-56015
- Rule IDs
-
- SV-70269r1_rule
Checks: C-56585r2_chk
Review web server configuration to determine if the server is using a transmission method that maintains the confidentiality and integrity of information during reception. If a transmission method is not being used that maintains the confidentiality and integrity of the data during reception, this is a finding.
Fix: F-60893r1_fix
Configure the web server to utilize a transmission method that maintains the confidentiality and integrity of information during reception.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-APP-000416-WSR-000118
- Vuln IDs
-
- V-56017
- Rule IDs
-
- SV-70271r1_rule
Checks: C-56587r2_chk
Review policy documents to identify data that is compartmentalized (i.e. classified, sensitive, need-to-know, etc.) and requires cryptographic protection. Review the web server documentation and deployed configuration to identify the encryption modules utilized to protect the compartmentalized data. If the encryption modules used to protect the compartmentalized data are not compliant with the data, this is a finding.
Fix: F-60895r1_fix
Configure the web server to utilize cryptography when protecting compartmentalized data.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- SRG-APP-000206-WSR-000128
- Vuln IDs
-
- V-56019
- Rule IDs
-
- SV-70273r1_rule
Checks: C-56589r2_chk
Review the web server documentation and deployed configuration to determine whether mobile code used by hosted applications follows the DoD policies on the acquisition, development, and/or use of mobile code. If the web server is not configured to follow the DoD policies on mobile code, this is a finding.
Fix: F-60897r1_fix
Configure the web server to follow the DoD policies on mobile code.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001185
- Version
- SRG-APP-000220-WSR-000201
- Vuln IDs
-
- V-56021
- Rule IDs
-
- SV-70275r1_rule
Checks: C-56591r2_chk
Review the web server documentation and deployed configuration to verify that the web server is configured to invalidate session identifiers when a session is terminated. If the web server does not invalidate session identifiers when a session is terminated, this is a finding.
Fix: F-60899r1_fix
Configure the web server to invalidate session identifiers when a session is terminated.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001188
- Version
- SRG-APP-000224-WSR-000135
- Vuln IDs
-
- V-56023
- Rule IDs
-
- SV-70277r1_rule
Checks: C-56593r2_chk
Review the web server documentation and deployed configuration to verify that the web server is configured to generate unique session identifiers with a FIPS 140-2 approved random number generator. Request two users access the web server and view the session identifier generated for each user to verify that the session IDs are not sequential. If the web server is not configured to generate unique session identifiers or the random number generator is not FIPS 140-2 approved, this is a finding.
Fix: F-60901r1_fix
Configure the web server to generate unique session identifiers using a FIPS 140-2 random number generator.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001664
- Version
- SRG-APP-000223-WSR-000011
- Vuln IDs
-
- V-56025
- Rule IDs
-
- SV-70279r1_rule
Checks: C-56595r2_chk
Review the web server documentation and configuration to determine if cookies between the web server and client are accessible by applications or web servers other than the originating pair. If the cookie information is accessible outside the originating pair, this is a finding.
Fix: F-60903r1_fix
Configure the web server to set properties within cookies to disallow the cookie to be accessed by other web servers and applications.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-002470
- Version
- SRG-APP-000427-WSR-000186
- Vuln IDs
-
- V-56027
- Rule IDs
-
- SV-70281r1_rule
Checks: C-56597r2_chk
Review the web server deployed configuration to determine if the web server will accept client certificates issued by unapproved PKIs. The authoritative list of DoD-approved PKIs is published at http://iase.disa.mil/pki-pke/interoperability. If the web server will accept non-DoD approved PKI client certificates, this is a finding.
Fix: F-60905r1_fix
Configure the web server to only accept DoD and DoD-approved PKI client certificates.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-APP-000225-WSR-000074
- Vuln IDs
-
- V-56029
- Rule IDs
-
- SV-70283r1_rule
Checks: C-56599r2_chk
Review the web server documentation and deployed configuration to determine if the web server offers the capability to reinstall from a known state. If the web server does not offer this capability, determine if the web server, in any manner, prohibits the reinstallation of a known state. If the web server does prohibit the reinstallation to a known state, this is a finding.
Fix: F-60907r1_fix
Configure the web server to augment and not hinder the reinstallation of a known and stable baseline.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002476
- Version
- SRG-APP-000429-WSR-000113
- Vuln IDs
-
- V-56031
- Rule IDs
-
- SV-70285r1_rule
Checks: C-56601r2_chk
Review the web server documentation and deployed configuration to determine whether the web server is authorizing and managing users. If the web server is not authorizing and managing users, this is NA. If the web server is the user authenticator and manager, verify that stored user identifiers and passwords are being encrypted by the web server. If the user information is not being encrypted when stored, this is a finding.
Fix: F-60909r1_fix
Configure the web server to encrypt the user identifiers and passwords when storing them on digital media.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- SRG-APP-000456-WSR-000187
- Vuln IDs
-
- V-56033
- Rule IDs
-
- SV-70287r1_rule
Checks: C-56603r2_chk
Review the web server documentation and configuration to determine if the web server checks for patches from an authoritative source at least every 24 hours. If there is no timeframe or the timeframe is greater than 24 hours, this is a finding.
Fix: F-60911r1_fix
Configure the web server to check for patches and updates from an authoritative source at least every 24 hours.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- SRG-APP-000266-WSR-000142
- Vuln IDs
-
- V-56035
- Rule IDs
-
- SV-70289r1_rule
Checks: C-56605r2_chk
Review the web server documentation and deployed configuration to locate all the web document directories. Verify that each web document directory contains a default hosted application web page that can be used by the web server in the event a web page cannot be found. If a document directory does not contain a default web page, this is a finding.
Fix: F-60913r1_fix
Place a default web page in every web document directory.