Web Server Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 1
Comparison against the immediately-prior release (V2R2). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 1
- V-56033 Medium checkfix The web server must install security-relevant software updates within the configured time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- SRG-APP-000001-WSR-000001
- Vuln IDs
-
- V-40791
- Rule IDs
-
- SV-53018r3_rule
Checks: C-47298r3_chk
Review the web server documentation and configuration to determine if the number of simultaneous sessions is limited. If the parameter is not configured or is unlimited, this is a finding.
Fix: F-45918r3_fix
Configure the web server to limit the number of concurrent sessions.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- SRG-APP-000001-WSR-000002
- Vuln IDs
-
- V-40792
- Rule IDs
-
- SV-53023r3_rule
Checks: C-47329r3_chk
Review the web server documentation and configuration to determine if server-side session management is configured. If it is not configured, this is a finding.
Fix: F-45949r2_fix
Configure the web server to perform server-side session management.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- SRG-APP-000016-WSR-000005
- Vuln IDs
-
- V-40799
- Rule IDs
-
- SV-53035r3_rule
Checks: C-47342r2_chk
Review the web server documentation and configuration to determine if the web server is configured to generate information for external applications monitoring remote access. If a mechanism is not in place providing information to an external application used to monitor and control access, this is a finding.
Fix: F-45961r2_fix
Configure the web server to provide remote connection information to external monitoring and access control applications.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- SRG-APP-000014-WSR-000006
- Vuln IDs
-
- V-40800
- Rule IDs
-
- SV-53037r3_rule
Checks: C-47343r2_chk
Review the web server documentation and configuration to determine the communication methods that are being used. Verify the encryption being used is in accordance with the categorization of data being hosted when remote connections are provided. If it is not, then this is a finding.
Fix: F-45963r2_fix
Configure the web server to use encryption strength equal to the categorization of data hosted when remote connections are provided.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- SRG-APP-000015-WSR-000014
- Vuln IDs
-
- V-40819
- Rule IDs
-
- SV-53068r3_rule
Checks: C-47375r2_chk
Review the web server documentation and configuration to make certain that the web server is configured to use cryptography to protect the integrity of remote access sessions. If the web server is not configured to use cryptography to protect the integrity of remote access sessions, this is a finding.
Fix: F-45994r2_fix
Configure the web server to utilize encryption during remote access sessions.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SRG-APP-000089-WSR-000047
- Vuln IDs
-
- V-41600
- Rule IDs
-
- SV-54177r3_rule
Checks: C-48029r2_chk
Review the web server documentation and the deployed system configuration to determine if, at a minimum, system startup and shutdown, system access, and system authentication events are logged. If the logs do not include the minimum logable events, this is a finding.
Fix: F-47059r3_fix
Configure the web server to generate log records for system startup and shutdown, system access, and system authentication events.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001462
- Version
- SRG-APP-000093-WSR-000053
- Vuln IDs
-
- V-41609
- Rule IDs
-
- SV-54186r3_rule
Checks: C-48038r2_chk
Review the web server documentation and deployed configuration to determine if the web server captures and logs all content related to a user session. Request a user access the hosted applications and verify the complete session is logged. If any of the session is excluded from the log, this is a finding.
Fix: F-47068r2_fix
Configure the web server to capture and log all content related to a user session.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001464
- Version
- SRG-APP-000092-WSR-000055
- Vuln IDs
-
- V-41611
- Rule IDs
-
- SV-54188r3_rule
Checks: C-48040r2_chk
Review the web server documentation and deployed configuration to determine if the web server captures log data as soon as the web server is started. If the web server does not capture logable events upon startup, this is a finding.
Fix: F-47070r2_fix
Configure the web server to capture logable events upon startup.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SRG-APP-000095-WSR-000056
- Vuln IDs
-
- V-41612
- Rule IDs
-
- SV-54189r3_rule
Checks: C-48041r2_chk
Review the web server documentation and deployed configuration to determine if the web server contains sufficient information to establish what type of event occurred. Request a user access the hosted applications, and verify sufficient information is recorded. If sufficient information is not logged, this is a finding.
Fix: F-47071r2_fix
Configure the web server to record sufficient information to establish what type of events occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- SRG-APP-000096-WSR-000057
- Vuln IDs
-
- V-41613
- Rule IDs
-
- SV-54190r3_rule
Checks: C-48042r2_chk
Review the web server documentation and deployment configuration to determine if the web server is configured to generate a date and time for each logged event. Request a user access the hosted application and generate logable events, and then review the logs to determine if the date and time are included in the log event data. If the date and time are not included, this is a finding.
Fix: F-47072r2_fix
Configure the web server to log date and time with the event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-APP-000097-WSR-000058
- Vuln IDs
-
- V-41614
- Rule IDs
-
- SV-54191r3_rule
Checks: C-48043r2_chk
Review the web server documentation and deployment configuration to determine if the web server is configured to generate sufficient information to resolve in which process within the web server the log event occurred. Request a user access the hosted application and generate logable events, and then review the logs to determine if the process of the event within the web server can be established. If it cannot be determined where the event occurred, this is a finding.
Fix: F-47073r2_fix
Configure the web server to generate enough information to determine in what process within the web server the log event occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SRG-APP-000098-WSR-000059
- Vuln IDs
-
- V-41615
- Rule IDs
-
- SV-54192r3_rule
Checks: C-48044r2_chk
Review the web server documentation and deployment configuration to determine if the web server is configured to generate sufficient information to resolve the source, e.g. source IP, of the log event. Request a user access the hosted application and generate logable events, and then review the logs to determine if the source of the event can be established. If the source of the event cannot be determined, this is a finding.
Fix: F-47074r2_fix
Configure the web server to generate the source of each logable event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SRG-APP-000098-WSR-000060
- Vuln IDs
-
- V-41616
- Rule IDs
-
- SV-54193r3_rule
Checks: C-48045r2_chk
Review the deployment configuration to determine if the web server is sitting behind a proxy server. If the web server is not sitting behind a proxy server, this finding is NA. If the web server is behind a proxy server, review the documentation and deployment configuration to determine if the web server is configured to generate sufficient information to resolve the source, e.g. source IP, of the logged event and not the proxy server. Request a user access the hosted application through the proxy server and generate logable events, and then review the logs to determine if the source of the event can be established. If the source of the event cannot be determined, this is a finding.
Fix: F-47075r2_fix
Configure the web server to generate the client source, not the load balancer or proxy server, of each logable event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SRG-APP-000099-WSR-000061
- Vuln IDs
-
- V-41617
- Rule IDs
-
- SV-54194r3_rule
Checks: C-48046r2_chk
Review the web server documentation and deployment configuration to determine if the web server is configured to generate the outcome (success or failure) of the event. Request a user access the hosted application and generate logable events, and then review the logs to determine if the outcome of the event can be established. If the outcome of the event cannot be determined, this is a finding.
Fix: F-47076r2_fix
Configure the web server to generate the outcome, success or failure, as part of each logable event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- SRG-APP-000100-WSR-000064
- Vuln IDs
-
- V-41620
- Rule IDs
-
- SV-54197r3_rule
Checks: C-48049r2_chk
Review the web server documentation and deployment configuration to determine if the web server can generate log data containing the user/subject identity. Request a user access the hosted application and generate logable events, and verify the events contain the user/subject or process identity. If the identity is not part of the log record, this is a finding.
Fix: F-47079r2_fix
Configure the web server to include the user/subject identity or process as part of each log record.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-000159
- Version
- SRG-APP-000116-WSR-000066
- Vuln IDs
-
- V-41668
- Rule IDs
-
- SV-54245r3_rule
Checks: C-48065r2_chk
Review the web server documentation and deployment configuration to determine if the internal system clock is used for date and time stamps. If this is not feasible, an alternative workaround is to take an action that generates an entry in the log and then immediately query the operating system for the current time. A reasonable match between the two times will suffice as evidence that the system is using the internal clock for date and time stamps. If the web server does not use the internal system clock to generate time stamps, this is a finding.
Fix: F-47127r2_fix
Configure the web server to use internal system clocks to generate date and time stamps for log records.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- SRG-APP-000118-WSR-000068
- Vuln IDs
-
- V-41670
- Rule IDs
-
- SV-54247r3_rule
Checks: C-48067r2_chk
Review the web server documentation and deployed configuration settings to determine if the web server logging features protect log information from unauthorized access. Review file system settings to verify the log files have secure file permissions. If the web server log files are not protected from unauthorized access, this is a finding.
Fix: F-47129r2_fix
Configure the web server log files so unauthorized access of log information is not possible.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- SRG-APP-000119-WSR-000069
- Vuln IDs
-
- V-41671
- Rule IDs
-
- SV-54248r3_rule
Checks: C-48068r2_chk
Review the web server documentation and deployed configuration settings to determine if the web server logging features protect log information from unauthorized modification. Review file system settings to verify the log files have secure file permissions. If the web server log files are not protected from unauthorized modification, this is a finding.
Fix: F-47130r3_fix
Configure the web server log files so unauthorized modification of log information is not possible.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- SRG-APP-000120-WSR-000070
- Vuln IDs
-
- V-41672
- Rule IDs
-
- SV-54249r3_rule
Checks: C-48069r2_chk
Review the web server documentation and deployed configuration settings to determine if the web server logging features protect log information from unauthorized deletion. Review file system settings to verify the log files have secure file permissions. If the web server log files are not protected from unauthorized deletion, this is a finding.
Fix: F-47131r2_fix
Configure the web server log files so unauthorized deletion of log information is not possible.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001348
- Version
- SRG-APP-000125-WSR-000071
- Vuln IDs
-
- V-41674
- Rule IDs
-
- SV-54251r3_rule
Checks: C-48071r3_chk
Review the web server documentation and deployed configuration to determine if the web server log records are backed up onto an unrelated system or media than the system being logged. If the web server logs are not backed up onto a different system or media than the system being logged, this is a finding.
Fix: F-47133r3_fix
Configure the web server logs to be backed up onto a different system or media other than the system being logged.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- SRG-APP-000131-WSR-000073
- Vuln IDs
-
- V-41684
- Rule IDs
-
- SV-54261r3_rule
Checks: C-48081r2_chk
Review the web server documentation and configuration to determine if web server modules are fully tested before implementation in the production environment. Review the web server for modules identified as test, debug, or backup and that cannot be reached through the hosted application. Review the web server to see if the web server or an external utility is in use to enforce the signing of modules before they are put into a production environment. If development and testing is taking place on the production web server or modules are put into production without being signed, this is a finding.
Fix: F-47143r2_fix
Configure the web server to enforce, internally or through an external utility, the review, testing and signing of modules before implementation into the production environment.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000075
- Vuln IDs
-
- V-41693
- Rule IDs
-
- SV-54270r3_rule
Checks: C-48090r2_chk
Review the web server documentation and deployed configuration to determine if web server features, services, and processes are installed that are not needed for hosted application deployment. If excessive features, services, and processes are installed, this is a finding.
Fix: F-47152r2_fix
Uninstall or deactivate features, services, and processes not needed by the web server for operation.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000076
- Vuln IDs
-
- V-41694
- Rule IDs
-
- SV-54271r3_rule
Checks: C-48091r2_chk
Review the web server documentation and deployed configuration to determine if the web server is also a proxy server. If the web server is also acting as a proxy server, this is a finding.
Fix: F-47153r3_fix
Uninstall any proxy services, modules, and libraries that are used by the web server to act as a proxy server. Verify all configuration changes are made to assure the web server is no longer acting as a proxy server in any manner.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000077
- Vuln IDs
-
- V-41695
- Rule IDs
-
- SV-54272r3_rule
Checks: C-48092r2_chk
Review the web server documentation and deployment configuration to determine if the web server contains documentation, sample code, example applications, or tutorials. Verify the web server install process also offers an option to exclude these elements from installation and provides an uninstall option for their removal. If web server documentation, sample code, example applications, or tutorials are installed or the web server install process does not offer an option to exclude these elements from installation, this is a finding.
Fix: F-47154r2_fix
Use the web server uninstall facility or manually remove any documentation, sample code, example applications, and tutorials.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000078
- Vuln IDs
-
- V-41696
- Rule IDs
-
- SV-54273r3_rule
Checks: C-48093r2_chk
Review the web server documentation to determine the user accounts created when particular features are installed. Verify the deployed configuration to determine which features are installed with the web server. If any accounts exist that are not used by the installed features, this is a finding.
Fix: F-47155r2_fix
Use the web server uninstall facility or manually remove the user accounts not used by the installed web server features.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000080
- Vuln IDs
-
- V-41698
- Rule IDs
-
- SV-54275r3_rule
Checks: C-48095r3_chk
Review the web server documentation and deployment configuration to determine which web server utilities, services, and modules are installed. Verify these options are essential to the operation of the web server. Also, confirm the web server install process offers an option to exclude these utilities, services, and modules from installation that are not needed for operation and that there is an uninstall option for their removal. If there are more utilities, services, or modules installed than are needed for the operation of the web server or the web server does not provide an install facility to customize installation, this is a finding.
Fix: F-47157r2_fix
Use the web server uninstall facility or manually remove any utility programs, services, or modules not needed by the web server for operation.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000081
- Vuln IDs
-
- V-41699
- Rule IDs
-
- SV-54276r3_rule
Checks: C-48096r2_chk
Review the web server documentation and deployment configuration to determine if the OS shell is accessible by any MIME types that are enabled. If a user of the web server can invoke OS shell programs, this is a finding.
Fix: F-47158r2_fix
Configure the web server to disable all MIME types that invoke OS shell programs.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000082
- Vuln IDs
-
- V-41700
- Rule IDs
-
- SV-54277r3_rule
Checks: C-48097r2_chk
Review the web server documentation and deployment configuration to determine what script mappings are available. Review the scripts used by the web server and the hosted applications. If there are script mappings in use that are not used by the web server or hosted applications for operation, this is a finding.
Fix: F-47159r2_fix
Remove script mappings that are not needed for web server and hosted application operation.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000083
- Vuln IDs
-
- V-41701
- Rule IDs
-
- SV-54278r3_rule
Checks: C-48098r2_chk
Review the web server documentation and deployment configuration to determine what types of files are being used for the hosted applications. If the web server is configured to allow other file types not associated with the hosted application, especially those associated with logs, configuration files, passwords, etc., this is a finding.
Fix: F-47160r2_fix
Configure the web server to only serve file types to the user that are needed by the hosted applications. All other file types must be disabled.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000085
- Vuln IDs
-
- V-41702
- Rule IDs
-
- SV-54279r3_rule
Checks: C-48099r2_chk
Review the web server documentation and deployment configuration to determine if Web Distributed Authoring (WebDAV) is enabled. If WebDAV is enabled, this is a finding.
Fix: F-47161r2_fix
Configure the web server to disable Web Distributed Authoring.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000086
- Vuln IDs
-
- V-41703
- Rule IDs
-
- SV-54280r3_rule
Checks: C-48100r2_chk
Review the web server documentation and configuration to determine the access to server resources given to hosted applications. If hosted applications have access to more system resources than needed for operation, this is a finding.
Fix: F-47162r2_fix
Configure the privileges given to hosted applications to the minimum required for application operation.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000087
- Vuln IDs
-
- V-41704
- Rule IDs
-
- SV-54281r3_rule
Checks: C-48101r3_chk
Review the web server documentation and configuration to determine where the document root or home directory for each application hosted by the web server is located. Verify that users of the web server applications, and any scripts running on the user's behalf, are contained to each application's domain. If users of the web server applications, and any scripts running on the user's behalf, are not contained, this is a finding.
Fix: F-47163r2_fix
Configure the web server to contain users and scripts to each hosted application's domain.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- SRG-APP-000142-WSR-000089
- Vuln IDs
-
- V-41706
- Rule IDs
-
- SV-54283r3_rule
Checks: C-48103r2_chk
Review the web server documentation and deployment configuration to determine whether the web server is configured to listen on a specified IP address and port. Request a client user try to access the web server on any other available IP addresses on the hosting hardware. If an IP address is not configured on the web server or a client can reach the web server on other IP addresses assigned to the hosting hardware, this is a finding.
Fix: F-47165r2_fix
Configure the web server to only listen on a specified IP address and port.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- SRG-APP-000175-WSR-000095
- Vuln IDs
-
- V-41730
- Rule IDs
-
- SV-54307r3_rule
Checks: C-48127r2_chk
Review the web server documentation and deployed configuration to determine whether the web server provides PKI functionality that validates certification paths in accordance with RFC 5280. If PKI is not being used, this is NA. If the web server is using PKI, but it does not perform this requirement, this is a finding.
Fix: F-47189r4_fix
Configure the web server to validate certificates in accordance with RFC 5280.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- SRG-APP-000176-WSR-000096
- Vuln IDs
-
- V-41731
- Rule IDs
-
- SV-54308r3_rule
Checks: C-48128r2_chk
If the web server does not have a private key, this is N/A. Review the web server documentation and deployed configuration to determine whether only authenticated system administrators and the designated PKI Sponsor for the web server can access the web server private key. If the private key is accessible by unauthenticated or unauthorized users, this is a finding.
Fix: F-47190r2_fix
Configure the web server to ensure only authenticated and authorized users can access the web server's private key.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- SRG-APP-000172-WSR-000104
- Vuln IDs
-
- V-41738
- Rule IDs
-
- SV-54315r3_rule
Checks: C-48135r2_chk
Review the web server documentation and deployed configuration to determine whether passwords are being passed to or from the web server. If the transmission of passwords is not encrypted, this is a finding.
Fix: F-47197r2_fix
Configure the web server to encrypt the transmission passwords.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- SRG-APP-000179-WSR-000110
- Vuln IDs
-
- V-41745
- Rule IDs
-
- SV-54322r3_rule
Checks: C-48142r2_chk
Review web server documentation and deployed configuration to determine whether the encryption modules utilized for storage of data are FIPS 140-2 compliant. Reference the following NIST site to identify validated encryption modules: http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm If the encryption modules used for storage of data are not FIPS 140-2 validated, this is a finding.
Fix: F-47204r2_fix
Configure the web server to utilize FIPS 140-2 approved encryption modules when the web server is storing data.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- SRG-APP-000179-WSR-000111
- Vuln IDs
-
- V-41746
- Rule IDs
-
- SV-54323r3_rule
Checks: C-48143r2_chk
Review web server documentation and deployed configuration to determine whether the encryption modules utilized for authentication are FIPS 140-2 compliant. Reference the following NIST site to identify validated encryption modules: http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm If the encryption modules used for authentication are not FIPS 140-2 validated, this is a finding.
Fix: F-47205r2_fix
Configure the web server to utilize FIPS 140-2 approved encryption modules when authenticating users and processes.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- SRG-APP-000211-WSR-000129
- Vuln IDs
-
- V-41794
- Rule IDs
-
- SV-54371r3_rule
Checks: C-48182r2_chk
Review the web server documentation and deployed configuration to determine whether hosted application functionality is separated from web server management functions. If the functions are not separated, this is a finding.
Fix: F-47253r2_fix
Configure the web server to separate the hosted applications from web server management functionality.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001188
- Version
- SRG-APP-000224-WSR-000136
- Vuln IDs
-
- V-41807
- Rule IDs
-
- SV-54384r3_rule
Checks: C-48195r2_chk
Review the web server documentation and deployed configuration to verify that random and unique session identifiers are generated. Access the web server ID generator function and generate two IDs using the same input. If the web server is not configured to generate random and unique session identifiers, or the ID generator generates the same ID for the same input, this is a finding.
Fix: F-47266r2_fix
Configure the web server to generate random and unique session identifiers that cannot be reliably reproduced.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001188
- Version
- SRG-APP-000224-WSR-000137
- Vuln IDs
-
- V-41808
- Rule IDs
-
- SV-54385r3_rule
Checks: C-48196r2_chk
Review the web server documentation and deployed configuration to see how long the generated session identifiers are. If the web server is not configured to generate session identifiers that are at least 128 bits (16 bytes) in length, this is a finding.
Fix: F-47267r2_fix
Configure the web server to generate session identifiers that are at least 128 bits in length.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001188
- Version
- SRG-APP-000224-WSR-000138
- Vuln IDs
-
- V-41809
- Rule IDs
-
- SV-54386r3_rule
Checks: C-48197r2_chk
Review the web server documentation and deployed configuration to determine what characters are used in generating session IDs. If the web server is not configured to use at least A-Z, a-z, and 0-9 to generate session identifiers, this is a finding.
Fix: F-47268r2_fix
Configure the web server to use at least A-Z, a-z, and 0-9 to generate session IDs.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001188
- Version
- SRG-APP-000224-WSR-000139
- Vuln IDs
-
- V-41810
- Rule IDs
-
- SV-54387r3_rule
Checks: C-48198r3_chk
Review the web server documentation and deployed configuration to verify that the web server is generating random session IDs with entropy equal to at least half the session ID length. If the web server is not configured to generate random session IDs with the proper amount of entropy, this is a finding.
Fix: F-47269r2_fix
Configure the web server to generate random session IDs with minimum entropy equal to half the session ID length.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-APP-000225-WSR-000140
- Vuln IDs
-
- V-41811
- Rule IDs
-
- SV-54388r3_rule
Checks: C-48199r2_chk
Review the web server documentation, deployed configuration, and risk analysis documentation to determine whether the web server will fail to known states for system initialization, shutdown, or abort failures. If the web server will not fail to known state, this is a finding.
Fix: F-47270r3_fix
Configure the web server to fail to the states of operation during system initialization, shutdown, or abort failures found in the risk analysis.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-APP-000225-WSR-000141
- Vuln IDs
-
- V-41812
- Rule IDs
-
- SV-54389r3_rule
Checks: C-48200r2_chk
Review the web server documentation, deployed configuration, and risk analysis documentation to verify that the web server is configured to provide clustering functionality, if the web server is a high-availability web server. If the web server is not a high-availability web server, this finding is NA. If the web server is not configured to provide clustering or some form of failover functionality and the web server is a high-availability server, this is a finding.
Fix: F-47271r2_fix
Configure the web server to provide application failover, or participate in a web cluster that provides failover for high-availability web servers.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- SRG-APP-000231-WSR-000144
- Vuln IDs
-
- V-41815
- Rule IDs
-
- SV-54392r3_rule
Checks: C-48203r2_chk
Review the web server documentation and deployed configuration to locate where potential data at rest is stored. Verify that the data is encrypted using a DoD-accepted algorithm to protect the confidentiality and integrity of the information. If the data is not encrypted using a DoD-accepted algorithm, this is a finding.
Fix: F-47274r2_fix
Use a DoD-accepted algorithm to encrypt data at rest to protect the information's confidentiality and integrity.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001664
- Version
- SRG-APP-000223-WSR-000145
- Vuln IDs
-
- V-41818
- Rule IDs
-
- SV-54395r3_rule
Checks: C-48206r2_chk
Review the web server documentation and deployed configuration to determine whether the web server accepts session IDs that are not system-generated. If the web server does accept non-system-generated session IDs, this is a finding.
Fix: F-47277r3_fix
Configure the web server to only accept session IDs that are created by the web server.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- SRG-APP-000233-WSR-000146
- Vuln IDs
-
- V-41821
- Rule IDs
-
- SV-54398r3_rule
Checks: C-48209r2_chk
Review the web server documentation and deployed configuration to determine where the document directory is located for each hosted application. If the document directory is not in a separate partition from the web server's system files, this is a finding.
Fix: F-47280r2_fix
Configure the web server to place the document directories in a separate partition from the web server system files.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- SRG-APP-000246-WSR-000149
- Vuln IDs
-
- V-41833
- Rule IDs
-
- SV-54410r3_rule
Checks: C-48221r2_chk
Review the web server documentation and deployed configuration to determine whether the web server has been configured to limit the ability of the web server to be used in a DoS attack. If not, this is a finding.
Fix: F-47292r2_fix
Configure the web server to limit the ability of users to use the web server in a DoS attack.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- SRG-APP-000251-WSR-000157
- Vuln IDs
-
- V-41852
- Rule IDs
-
- SV-54429r3_rule
Checks: C-48240r2_chk
Review the web server documentation and deployed configuration to determine what the data set is for data entry. If the web server does not limit the data set used for data entry, this is a finding.
Fix: F-47311r2_fix
Configure the web server to only accept the character sets expected by the hosted applications.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- SRG-APP-000266-WSR-000159
- Vuln IDs
-
- V-41854
- Rule IDs
-
- SV-54431r3_rule
Checks: C-48242r2_chk
Review the web server documentation and deployed configuration to determine whether the web server offers different modes of operation that will minimize the identity of the web server, patches, loaded modules, and directory paths given to clients on error conditions. If the web server is not configured to minimize the information given to clients, this is a finding.
Fix: F-47313r2_fix
Configure the web server to minimize the information provided to the client in warning and error messages.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- SRG-APP-000266-WSR-000160
- Vuln IDs
-
- V-41855
- Rule IDs
-
- SV-54432r3_rule
Checks: C-48243r3_chk
Review the web server documentation and deployed configuration to determine if debugging and trace information are enabled. If the web server is configured with debugging and trace information enabled, this is a finding.
Fix: F-47314r2_fix
Configure the web server to minimize the information given to clients on error conditions by disabling debugging and trace information.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- SRG-APP-000033-WSR-000169
- Vuln IDs
-
- V-55945
- Rule IDs
-
- SV-70199r2_rule
Checks: C-56515r2_chk
The web server must be configured to perform an authorization check to verify that the authenticated entity should be granted access to the requested content. If the web server does not verify that the authenticated entity is authorized to access the requested content prior to granting access, this is a finding.
Fix: F-60823r1_fix
Configure the web server to validate the authenticated entity's authorization to access requested content prior to granting access.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- SRG-APP-000340-WSR-000029
- Vuln IDs
-
- V-55947
- Rule IDs
-
- SV-70201r2_rule
Checks: C-56517r2_chk
Review the web server documentation and configuration to determine if accounts used for administrative duties of the web server are separated from non-privileged accounts. If non-privileged accounts can access web server security-relevant information, this is a finding.
Fix: F-60825r1_fix
Set up accounts and roles that can be used to perform web server security-relevant tasks and remove or modify non-privileged account access to security-relevant tasks.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- SRG-APP-000295-WSR-000134
- Vuln IDs
-
- V-55949
- Rule IDs
-
- SV-70203r2_rule
Checks: C-56519r2_chk
Review the hosted applications, web server documentation and deployed configuration to verify that the web server will close an open session after a configurable time of inactivity. If the web server does not close sessions after a configurable time of inactivity or the amount of time is configured higher than 5 minutes for high-risk applications, 10 minutes for medium-risk applications, or 20 minutes for low-risk applications, this is a finding.
Fix: F-60827r1_fix
Configure the web server to close inactive sessions after 5 minutes for high-risk applications, 10 minutes for medium-risk applications, or 20 minutes for low-risk applications.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- SRG-APP-000295-WSR-000012
- Vuln IDs
-
- V-55951
- Rule IDs
-
- SV-70205r2_rule
Checks: C-56521r2_chk
Review the web server documentation and deployed configuration to verify that the web server is configured to close sessions after an absolute period of time. If the web server is not configured to close sessions after an absolute period of time, this is a finding.
Fix: F-60829r1_fix
Configure the web server to close sessions after an absolute period of time.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- SRG-APP-000315-WSR-000003
- Vuln IDs
-
- V-55953
- Rule IDs
-
- SV-70207r2_rule
Checks: C-56523r2_chk
Review the web server product documentation and deployed configuration to determine if the server or an enterprise tool is enforcing the organization's requirements for remote connections. If the web server is not configured to enforce these requirements and an enterprise tool is not in place, this is a finding.
Fix: F-60831r2_fix
Configure the web server to enforce the remote access policy or to work with an enterprise tool designed to enforce the policy.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002322
- Version
- SRG-APP-000316-WSR-000170
- Vuln IDs
-
- V-55955
- Rule IDs
-
- SV-70209r2_rule
Checks: C-56525r2_chk
Review the web server documentation and configuration to make certain that the web server is configured to allow for the immediate disconnection or disabling of remote access to hosted applications when necessary. If the web server is not capable of or cannot be configured to disconnect or disable remote access to the hosted applications when necessary, this is a finding.
Fix: F-60833r1_fix
Configure the web server to provide the capability to immediately disconnect or disable remote access to the hosted applications.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001844
- Version
- SRG-APP-000356-WSR-000007
- Vuln IDs
-
- V-55957
- Rule IDs
-
- SV-70211r2_rule
Checks: C-56527r2_chk
Review the web server documentation and configuration to determine if the web server is part of a cluster. If the web server is not part of a cluster, then this is NA. If the web server is part of a cluster and is not centrally managed, then this is a finding.
Fix: F-60835r1_fix
Configure the web server to be centrally managed.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- SRG-APP-000357-WSR-000150
- Vuln IDs
-
- V-55959
- Rule IDs
-
- SV-70213r2_rule
Checks: C-56529r2_chk
Review the web server documentation and deployment configuration to determine if the web server is using a logging mechanism to store log records. If a logging mechanism is in use, validate that the mechanism is configured to use record storage capacity in accordance with specifications within NIST SP 800-92 for log record storage requirements. If the web server is not using a logging mechanism, or if the mechanism has not been configured to allocate log record storage capacity in accordance with NIST SP 800-92, this is a finding.
Fix: F-60837r1_fix
Configure the web server to use a logging mechanism that is configured to allocate log record storage capacity in accordance with NIST SP 800-92 log record storage requirements.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- SRG-APP-000315-WSR-000004
- Vuln IDs
-
- V-55961
- Rule IDs
-
- SV-70215r2_rule
Checks: C-56531r2_chk
Review the web server configuration to verify that the web server is restricting access from nonsecure zones. If the web server is not configured to restrict access from nonsecure zones, then this is a finding.
Fix: F-60839r1_fix
Configure the web server to block access from DoD-defined nonsecure zones.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-APP-000358-WSR-000063
- Vuln IDs
-
- V-55969
- Rule IDs
-
- SV-70223r2_rule
Checks: C-56539r2_chk
Review the web server documentation and deployment configuration to determine if the web server can write log data to, or if log data can be transferred to, a separate audit server. Request a user access the hosted application and generate logable events and verify the data is written to a separate audit server. If logs cannot be directly written or transferred on request or on a periodic schedule to an audit log server, this is a finding.
Fix: F-60847r1_fix
Configure the web server to directly write or transfer the logs to a remote audit log server.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-APP-000358-WSR-000163
- Vuln IDs
-
- V-55971
- Rule IDs
-
- SV-70225r2_rule
Checks: C-56541r2_chk
Review the web server documentation and deployed configuration to determine whether the web server is logging security-relevant events. Determine whether there is a security tool in place that allows review and alert capabilities and whether the web server is sending events to this system. If the web server is not, this is a finding.
Fix: F-60849r1_fix
Configure the web server to send logged events to the organization's security infrastructure tool that offers review and alert capabilities.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000139
- Version
- SRG-APP-000108-WSR-000166
- Vuln IDs
-
- V-55973
- Rule IDs
-
- SV-70227r2_rule
Checks: C-56543r2_chk
Review the web server documentation and deployment configuration settings to determine if the web server logging system provides an alert to the ISSO and the SA at a minimum when a processing failure occurs. If alerts are not sent or the web server is not configured to use a dedicated logging tool that meets this requirement, this is a finding.
Fix: F-60851r2_fix
Configure the web server to provide an alert to the ISSO and SA when log processing failures occur. If the web server cannot generate alerts, utilize an external logging system that meets this criterion.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- SRG-APP-000359-WSR-000065
- Vuln IDs
-
- V-55975
- Rule IDs
-
- SV-70229r2_rule
Checks: C-56545r2_chk
Review the web server documentation and deployment configuration settings to determine if the web server log system provides a warning to the ISSO and SA when allocated record storage volume reaches 75% of maximum record storage capacity. If designated alerts are not sent or the web server is not configured to use a dedicated log tool that meets this requirement, this is a finding.
Fix: F-60853r1_fix
Configure the web server to provide a warning to the ISSO and SA when allocated log record storage volume reaches 75% of maximum record storage capacity.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001889
- Version
- SRG-APP-000375-WSR-000171
- Vuln IDs
-
- V-55977
- Rule IDs
-
- SV-70231r2_rule
Checks: C-56547r2_chk
Review the web server documentation and configuration to determine if log records are time stamped to a minimum granularity of one second. Have a user generate a logable event and review the log data to determine if the web server is configured correctly. If the log data does not contain a time stamp to a minimum granularity of one second, this is a finding.
Fix: F-60855r1_fix
Configure the web server to record log events with a time stamp to a granularity of one second.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001890
- Version
- SRG-APP-000374-WSR-000172
- Vuln IDs
-
- V-55979
- Rule IDs
-
- SV-70233r2_rule
Checks: C-56549r2_chk
Review the web server documentation and configuration to determine the time stamp format for log data. If the time stamp is not mapped to UTC or GMT time, this is a finding.
Fix: F-60857r1_fix
Configure the web server to store log data time stamps in a format that is mapped to UTC or GMT time.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- SRG-APP-000380-WSR-000072
- Vuln IDs
-
- V-55981
- Rule IDs
-
- SV-70235r2_rule
Checks: C-56551r2_chk
Review the web server documentation and configuration to determine if the web server provides unique account roles specifically for the purposes of segmenting the responsibilities for managing the web server. Log into the hosting server using a web server role with limited permissions (e.g., Auditor, Developer, etc.) and verify the account is not able to perform configuration changes that are not related to that role. If roles are not defined with limited permissions and restrictions, this is a finding.
Fix: F-60859r2_fix
Define roles and responsibilities to be used when managing the web server. Configure the hosting system to utilize specific roles that restrict access related to web server system and configuration changes.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- SRG-APP-000131-WSR-000051
- Vuln IDs
-
- V-55983
- Rule IDs
-
- SV-70237r2_rule
Checks: C-56553r2_chk
Review the web server documentation and deployment configuration to determine if the web server validates files before the files are implemented into the running configuration. If the web server does not meet this requirement and an external facility is not available for use, this is a finding.
Fix: F-60861r1_fix
Configure the web server to verify object integrity before becoming part of the production web server or utilize an external tool designed to meet this requirement.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-WSR-000174
- Vuln IDs
-
- V-55985
- Rule IDs
-
- SV-70239r2_rule
Checks: C-56555r2_chk
Review the web server documentation and deployed configuration to determine if web server is configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance. If the web server is not configured according to the guidance, this is a finding.
Fix: F-60863r1_fix
Configure the web server to be configured according to DoD security configuration guidance.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-WSR-000079
- Vuln IDs
-
- V-55987
- Rule IDs
-
- SV-70241r2_rule
Checks: C-56557r2_chk
Review the web server documentation and deployment configuration to determine what non-service/system accounts were installed by the web server installation process. Verify the passwords for these accounts have been set and/or changed from the default passwords. If these accounts still have no password or default passwords, this is a finding.
Fix: F-60865r1_fix
Set passwords for non-service/system accounts containing no passwords and change the passwords for accounts which still have default passwords.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000015
- Vuln IDs
-
- V-55989
- Rule IDs
-
- SV-70243r2_rule
Checks: C-56559r2_chk
Review the web server documentation and configuration to determine if the web server is being used as a user management application. If the web server is being used to perform user management for the hosted applications, this is a finding.
Fix: F-60867r1_fix
Configure the web server to disable user management functionality.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- SRG-APP-000383-WSR-000175
- Vuln IDs
-
- V-55991
- Rule IDs
-
- SV-70245r2_rule
Checks: C-56561r2_chk
Review the web server documentation and deployment configuration to determine which ports and protocols are enabled. Verify that the ports and protocols being used are permitted, necessary for the operation of the web server and the hosted applications and are secure for a production system. If any of the ports or protocols are not permitted, are nonsecure or are not necessary for web server operation, this is a finding.
Fix: F-60869r1_fix
Configure the web server to disable any ports or protocols that are not permitted, are nonsecure for a production web server or are not necessary for web server operation.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- SRG-APP-000211-WSR-000031
- Vuln IDs
-
- V-55993
- Rule IDs
-
- SV-70247r2_rule
Checks: C-56563r2_chk
Review the web server documentation and configuration to determine if anonymous users can make changes to the web server or any applications hosted by the web server. If anonymous users can make changes, this is a finding.
Fix: F-60871r1_fix
Configure the web server to not allow anonymous users to change the web server or any hosted applications.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- SRG-APP-000211-WSR-000030
- Vuln IDs
-
- V-55995
- Rule IDs
-
- SV-70249r2_rule
Checks: C-56565r2_chk
Review the web server documentation and configuration to determine what web server accounts are available on the hosting server. If non-privileged web server accounts are available with access to functions, directories, or files not needed for the role of the account, this is a finding.
Fix: F-60873r1_fix
Limit the functions, directories, and files that are accessible by each account and role to administrative accounts and remove or modify non-privileged account access.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-APP-000435-WSR-000148
- Vuln IDs
-
- V-55997
- Rule IDs
-
- SV-70251r2_rule
Checks: C-56567r2_chk
Review the web server documentation and deployed configuration to determine what parameters are set to tune the web server. Review the hosted applications along with risk analysis documents to determine the expected user traffic. If the web server has not been tuned to avoid a DoS, this is a finding.
Fix: F-60875r2_fix
Analyze the expected user traffic for the hosted applications. Tune the web server to avoid a DoS condition under normal user traffic to the hosted applications.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-APP-000435-WSR-000147
- Vuln IDs
-
- V-55999
- Rule IDs
-
- SV-70253r2_rule
Checks: C-56569r2_chk
Review the web server documentation and deployed configuration to determine where the process ID is stored and which utilities are used to start/stop the web server. Determine whether the process ID and the utilities are protected from non-privileged users. If they are not protected, this is a finding.
Fix: F-60877r1_fix
Remove or modify non-privileged account access to the web server process ID and the utilities used for starting/stopping the web server.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-APP-000439-WSR-000151
- Vuln IDs
-
- V-56001
- Rule IDs
-
- SV-70255r2_rule
Checks: C-56571r2_chk
Review the web server documentation and deployed configuration to determine whether the transmission of data between the web server and external devices is encrypted. If the web server does not encrypt the transmission, this is a finding.
Fix: F-60879r1_fix
Configure the web server to encrypt the transmission of data between the web server and external devices.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-APP-000439-WSR-000152
- Vuln IDs
-
- V-56003
- Rule IDs
-
- SV-70257r2_rule
Checks: C-56573r2_chk
Review the web server documentation and deployed configuration to determine whether the session identifier is being sent to the client encrypted. If the web server does not encrypt the session identifier, this is a finding.
Fix: F-60881r1_fix
Configure the web server to encrypt the session identifier for transmission to the client.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-APP-000439-WSR-000153
- Vuln IDs
-
- V-56005
- Rule IDs
-
- SV-70259r2_rule
Checks: C-56575r2_chk
Review the web server documentation and deployed configuration to determine whether cookies are being sent to the client using SSL/TLS. If the transmission is through a SSL/TLS connection, but the cookie is not being compressed, this finding is NA. If the web server is using SSL/TLS for cookie transmission and the cookie is also being compressed, this is a finding.
Fix: F-60883r1_fix
Configure the web server to send the cookie to the client via SSL/TLS without using cookie compression.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-APP-000439-WSR-000154
- Vuln IDs
-
- V-56007
- Rule IDs
-
- SV-70261r2_rule
Checks: C-56577r2_chk
Review the web server documentation and deployed configuration to determine how to disable client-side scripts from reading cookies. If the web server is not configured to disallow client-side scripts from reading cookies, this is a finding.
Fix: F-60885r1_fix
Configure the web server to disallow client-side scripts the capability of reading cookie information.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-APP-000439-WSR-000155
- Vuln IDs
-
- V-56009
- Rule IDs
-
- SV-70263r2_rule
Checks: C-56579r2_chk
Review the web server documentation and deployed configuration to verify that cookies are encrypted before transmission. If the web server is not configured to encrypt cookies, this is a finding.
Fix: F-60887r1_fix
Configure the web server to encrypt cookies before transmission.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-APP-000439-WSR-000156
- Vuln IDs
-
- V-56011
- Rule IDs
-
- SV-70265r2_rule
Checks: C-56581r2_chk
Review the web server documentation and deployed configuration to determine which version of TLS is being used. If the TLS version is not an approved version according to NIST SP 800-52 or non-FIPS-approved algorithms are enabled, this is a finding.
Fix: F-60889r1_fix
Configure the web server to use an approved TLS version according to NIST SP 800-52 and to disable all non-approved versions.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002420
- Version
- SRG-APP-000441-WSR-000181
- Vuln IDs
-
- V-56013
- Rule IDs
-
- SV-70267r2_rule
Checks: C-56583r2_chk
Review the web server documentation and deployed configuration to determine if the web server maintains the confidentiality and integrity of information during preparation before transmission. If the confidentiality and integrity are not maintained, this is a finding.
Fix: F-60891r1_fix
Configure the web server to maintain the confidentiality and integrity of information during preparation for transmission.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002422
- Version
- SRG-APP-000442-WSR-000182
- Vuln IDs
-
- V-56015
- Rule IDs
-
- SV-70269r2_rule
Checks: C-56585r2_chk
Review web server configuration to determine if the server is using a transmission method that maintains the confidentiality and integrity of information during reception. If a transmission method is not being used that maintains the confidentiality and integrity of the data during reception, this is a finding.
Fix: F-60893r1_fix
Configure the web server to utilize a transmission method that maintains the confidentiality and integrity of information during reception.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-APP-000416-WSR-000118
- Vuln IDs
-
- V-56017
- Rule IDs
-
- SV-70271r2_rule
Checks: C-56587r2_chk
Review policy documents to identify data that is compartmentalized (i.e. classified, sensitive, need-to-know, etc.) and requires cryptographic protection. Review the web server documentation and deployed configuration to identify the encryption modules utilized to protect the compartmentalized data. If the encryption modules used to protect the compartmentalized data are not compliant with the data, this is a finding.
Fix: F-60895r1_fix
Configure the web server to utilize cryptography when protecting compartmentalized data.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- SRG-APP-000206-WSR-000128
- Vuln IDs
-
- V-56019
- Rule IDs
-
- SV-70273r2_rule
Checks: C-56589r2_chk
Review the web server documentation and deployed configuration to determine whether mobile code used by hosted applications follows the DoD policies on the acquisition, development, and/or use of mobile code. If the web server is not configured to follow the DoD policies on mobile code, this is a finding.
Fix: F-60897r1_fix
Configure the web server to follow the DoD policies on mobile code.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001185
- Version
- SRG-APP-000220-WSR-000201
- Vuln IDs
-
- V-56021
- Rule IDs
-
- SV-70275r2_rule
Checks: C-56591r2_chk
Review the web server documentation and deployed configuration to verify that the web server is configured to invalidate session identifiers when a session is terminated. If the web server does not invalidate session identifiers when a session is terminated, this is a finding.
Fix: F-60899r1_fix
Configure the web server to invalidate session identifiers when a session is terminated.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001188
- Version
- SRG-APP-000224-WSR-000135
- Vuln IDs
-
- V-56023
- Rule IDs
-
- SV-70277r2_rule
Checks: C-56593r2_chk
Review the web server documentation and deployed configuration to verify that the web server is configured to generate unique session identifiers with a FIPS 140-2 approved random number generator. Request two users access the web server and view the session identifier generated for each user to verify that the session IDs are not sequential. If the web server is not configured to generate unique session identifiers or the random number generator is not FIPS 140-2 approved, this is a finding.
Fix: F-60901r1_fix
Configure the web server to generate unique session identifiers using a FIPS 140-2 random number generator.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001664
- Version
- SRG-APP-000223-WSR-000011
- Vuln IDs
-
- V-56025
- Rule IDs
-
- SV-70279r2_rule
Checks: C-56595r2_chk
Review the web server documentation and configuration to determine if cookies between the web server and client are accessible by applications or web servers other than the originating pair. If the cookie information is accessible outside the originating pair, this is a finding.
Fix: F-60903r1_fix
Configure the web server to set properties within cookies to disallow the cookie to be accessed by other web servers and applications.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-002470
- Version
- SRG-APP-000427-WSR-000186
- Vuln IDs
-
- V-56027
- Rule IDs
-
- SV-70281r2_rule
Checks: C-56597r2_chk
Review the web server deployed configuration to determine if the web server will accept client certificates issued by unapproved PKIs. The authoritative list of DoD-approved PKIs is published at http://iase.disa.mil/pki-pke/interoperability. If the web server will accept non-DoD approved PKI client certificates, this is a finding.
Fix: F-60905r1_fix
Configure the web server to only accept DoD and DoD-approved PKI client certificates.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-APP-000225-WSR-000074
- Vuln IDs
-
- V-56029
- Rule IDs
-
- SV-70283r2_rule
Checks: C-56599r2_chk
Review the web server documentation and deployed configuration to determine if the web server offers the capability to reinstall from a known state. If the web server does not offer this capability, determine if the web server, in any manner, prohibits the reinstallation of a known state. If the web server does prohibit the reinstallation to a known state, this is a finding.
Fix: F-60907r1_fix
Configure the web server to augment and not hinder the reinstallation of a known and stable baseline.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002476
- Version
- SRG-APP-000429-WSR-000113
- Vuln IDs
-
- V-56031
- Rule IDs
-
- SV-70285r2_rule
Checks: C-56601r2_chk
Review the web server documentation and deployed configuration to determine whether the web server is authorizing and managing users. If the web server is not authorizing and managing users, this is NA. If the web server is the user authenticator and manager, verify that stored user identifiers and passwords are being encrypted by the web server. If the user information is not being encrypted when stored, this is a finding.
Fix: F-60909r1_fix
Configure the web server to encrypt the user identifiers and passwords when storing them on digital media.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- SRG-APP-000456-WSR-000187
- Vuln IDs
-
- V-56033
- Rule IDs
-
- SV-70287r3_rule
Checks: C-56603r3_chk
Review the web server documentation and configuration to determine if the web server checks for patches from an authoritative source at least every 30 days. If there is no timeframe or the timeframe is greater than 30 days, this is a finding.
Fix: F-60911r2_fix
Configure the web server to check for patches and updates from an authoritative source at least every 30 days.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- SRG-APP-000266-WSR-000142
- Vuln IDs
-
- V-56035
- Rule IDs
-
- SV-70289r2_rule
Checks: C-56605r2_chk
Review the web server documentation and deployed configuration to locate all the web document directories. Verify that each web document directory contains a default hosted application web page that can be used by the web server in the event a web page cannot be found. If a document directory does not contain a default web page, this is a finding.
Fix: F-60913r1_fix
Place a default web page in every web document directory.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-APP-000439-WSR-000188
- Vuln IDs
-
- V-61353
- Rule IDs
-
- SV-75835r1_rule
Checks: C-62283r1_chk
Review the web server documentation and deployed configuration to determine if export ciphers are removed. If the web server does not have the export ciphers removed, this is a finding.
Fix: F-67255r1_fix
Configure the web server to have export ciphers removed.