Web Server Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +95 −96
Comparison against the immediately-prior release (V2R3). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 95
- V-206350 Medium The web server must limit the number of allowed simultaneous session requests.
- V-206351 Medium The web server must perform server-side session management.
- V-206352 Medium The web server must use encryption strength in accordance with the categorization of data hosted by the web server when remote connections are provided.
- V-206353 Medium The web server must use cryptography to protect the integrity of remote sessions.
- V-206354 Medium The web server must generate information to be used by external applications or entities to monitor and control remote access.
- V-206355 Medium The web server must enforce approved authorizations for logical access to hosted applications and resources in accordance with applicable access control policies.
- V-206356 Medium The web server must generate, at a minimum, log records for system startup and shutdown, system access, and system authentication events.
- V-206357 Medium The web server must initiate session logging upon start up.
- V-206359 Medium The web server must produce log records containing sufficient information to establish what type of events occurred.
- V-206360 Medium The web server must produce log records containing sufficient information to establish when (date and time) events occurred.
- V-206361 Medium The web server must produce log records containing sufficient information to establish where within the web server the events occurred.
- V-206362 Medium The web server must produce log records containing sufficient information to establish the source of events.
- V-206363 Medium A web server, behind a load balancer or proxy server, must produce log records containing the client IP information as the source and destination and not the load balancer or proxy IP information with each event.
- V-206364 Medium The web server must produce log records that contain sufficient information to establish the outcome (success or failure) of events.
- V-206365 Medium The web server must produce log records containing sufficient information to establish the identity of any user/subject or process associated with an event.
- V-206366 Medium The web server must use a logging mechanism that is configured to alert the ISSO and SA in the event of a processing failure.
- V-206367 Medium The web server must use the internal system clock to generate time stamps for log records.
- V-206368 Medium Web server log files must only be accessible by privileged users.
- V-206369 Medium The log information from the web server must be protected from unauthorized modification.
- V-206370 Medium The log information from the web server must be protected from unauthorized deletion.
- V-206371 Medium The log data and records from the web server must be backed up onto a different system or media.
- V-206372 Medium All web server files must be verified for their integrity (e.g., checksums and hashes) before becoming part of the production web server.
- V-206373 Medium Expansion modules must be fully reviewed, tested, and signed before they can exist on a production web server.
- V-206374 Medium The web server must not perform user management for hosted applications.
- V-206375 Medium The web server must only contain services and functions necessary for operation.
- V-206376 Medium The web server must not be a proxy server.
- V-206377 Medium The web server must provide install options to exclude the installation of documentation, sample code, example applications, and tutorials.
- V-206378 Medium Web server accounts not utilized by installed features (i.e., tools, utilities, specific services, etc.) must not be created and must be deleted when the web server feature is uninstalled.
- V-206379 Medium The web server must provide install options to exclude installation of utility programs, services, plug-ins, and modules not necessary for operation.
- V-206380 Medium The web server must have Multipurpose Internet Mail Extensions (MIME) that invoke OS shell programs disabled.
- V-206381 Medium The web server must allow the mappings to unused and vulnerable scripts to be removed.
- V-206382 Medium The web server must have resource mappings set to disable the serving of certain file types.
- V-206383 Medium The web server must have Web Distributed Authoring (WebDAV) disabled.
- V-206384 Medium The web server must protect system resources and privileged operations from hosted applications.
- V-206385 Medium Users and scripts running on behalf of users must be contained to the document root or home directory tree of the web server.
- V-206386 Medium The web server must be configured to use a specified IP address and port.
- V-206387 Medium The web server must encrypt passwords during transmission.
- V-206388 Medium The web server must perform RFC 5280-compliant certification path validation.
- V-206389 Medium Only authenticated system administrators or the designated PKI Sponsor for the web server must have access to the web servers private key.
- V-206390 High The web server must use cryptographic modules that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance when encrypting stored data.
- V-206391 Medium The web server must use cryptographic modules that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.
- V-206392 Medium A web server utilizing mobile code must meet DoD-defined mobile code requirements.
- V-206393 Medium Web server accounts accessing the directory tree, the shell, or other operating system functions and utilities must only be administrative accounts.
- V-206394 Medium Anonymous user access to the web server application directories must be prohibited.
- V-206395 Medium The web server must separate the hosted applications from hosted web server management functionality.
- V-206396 Medium The web server must invalidate session identifiers upon hosted application user logout or other session termination.
- V-206397 Medium Cookies exchanged between the web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating web server and hosted application.
- V-206398 Medium The web server must accept only system-generated session identifiers.
- V-206399 High The web server must generate a unique session identifier for each session using a FIPS 140-2 approved random number generator.
- V-206400 Medium The web server must generate unique session identifiers that cannot be reliably reproduced.
- V-206401 Medium The web server must generate a session ID long enough that it cannot be guessed through brute force.
- V-206402 Medium The web server must generate a session ID using as much of the character set as possible to reduce the risk of brute force.
- V-206403 Medium The web server must generate unique session identifiers with definable entropy.
- V-206404 Medium The web server must augment re-creation to a stable and known baseline.
- V-206405 Medium The web server must be built to fail to a known safe state if system initialization fails, shutdown fails, or aborts fail.
- V-206406 Medium The web server must provide a clustering capability.
- V-206407 Medium Information at rest must be encrypted using a DoD-accepted algorithm to protect the confidentiality and integrity of the information.
- V-206408 Medium The web server document directory must be in a separate partition from the web servers system files.
- V-206409 Medium The web server must restrict the ability of users to launch Denial of Service (DoS) attacks against other information systems or networks.
- V-206410 Medium The web server must limit the character set used for data entry.
- V-206411 Medium The web server must display a default hosted application web page, not a directory listing, when a requested web page cannot be found.
- V-206412 Medium Warning and error messages displayed to clients must be modified to minimize the identity of the web server, patches, loaded modules, and directory paths.
- V-206413 Medium Debugging and trace information used to diagnose the web server must be disabled.
- V-206414 Medium The web server must set an absolute timeout for sessions.
- V-206415 Medium The web server must set an inactive timeout for sessions.
- V-206416 Medium Remote access to the web server must follow access policy or work in conjunction with enterprise tools designed to enforce policy requirements.
- V-206417 Medium The web server must restrict inbound connections from nonsecure zones.
- V-206418 Medium The web server must provide the capability to immediately disconnect or disable remote access to the hosted applications.
- V-206419 Medium Non-privileged accounts on the hosting system must only access web server security-relevant information and functions through a distinct administrative account.
- V-206420 Medium A web server that is part of a web server cluster must route all remote management through a centrally managed access control point.
- V-206421 Medium The web server must use a logging mechanism that is configured to allocate log record storage capacity large enough to accommodate the logging requirements of the web server.
- V-206422 Medium The web server must not impede the ability to write specified log record content to an audit log server.
- V-206423 Medium The web server must be configurable to integrate with an organizations security infrastructure.
- V-206424 Medium The web server must use a logging mechanism that is configured to provide a warning to the ISSO and SA when allocated record storage volume reaches 75% of maximum log record storage capacity.
- V-206425 Medium The web server must generate log records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
- V-206426 Medium The web server must record time stamps for log records to a minimum granularity of one second.
- V-206427 Medium The web server application, libraries, and configuration files must only be accessible to privileged users.
- V-206428 Medium The web server must prohibit or restrict the use of nonsecure or unnecessary ports, protocols, modules, and/or services.
- V-206430 Medium The web server must only accept client certificates issued by DoD PKI or DoD-approved PKI Certification Authorities (CAs).
- V-206431 Medium The web server must encrypt user identifiers and passwords.
- V-206432 Medium The web server must be protected from being stopped by a non-privileged user.
- V-206433 Medium The web server must be tuned to handle the operational requirements of the hosted application.
- V-206434 Medium The web server must employ cryptographic mechanisms (TLS/DTLS/SSL) preventing the unauthorized disclosure of information during transmission.
- V-206435 Medium Web server session IDs must be sent to the client using SSL/TLS.
- V-206436 Medium Web server cookies, such as session cookies, sent to the client using SSL/TLS must not be compressed.
- V-206437 Medium Cookies exchanged between the web server and the client, such as session cookies, must have cookie properties set to prohibit client-side scripts from reading the cookie data.
- V-206438 Medium Cookies exchanged between the web server and the client, such as session cookies, must have cookie properties set to force the encryption of cookies.
- V-206439 Medium A web server must maintain the confidentiality of controlled information during transmission through the use of an approved TLS version.
- V-206440 Medium The web server must remove all export ciphers to protect the confidentiality and integrity of transmitted information.
- V-206441 Medium The web server must maintain the confidentiality and integrity of information during preparation for transmission.
- V-206442 Medium The web server must maintain the confidentiality and integrity of information during reception.
- V-206443 Medium The web server must install security-relevant software updates within the configured time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).
- V-206444 Medium All accounts installed with the web server software and tools must have passwords assigned and default passwords changed.
- V-206445 Medium The web server must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
- V-239371 Medium The web server must implement required cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance when encrypting data that must be compartment
Removed rules 96
- V-40791 Medium The web server must limit the number of allowed simultaneous session requests.
- V-40792 Medium The web server must perform server-side session management.
- V-40799 Medium The web server must generate information to be used by external applications or entities to monitor and control remote access.
- V-40800 Medium The web server must use encryption strength in accordance with the categorization of data hosted by the web server when remote connections are provided.
- V-40819 Medium The web server must use cryptography to protect the integrity of remote sessions.
- V-41600 Medium The web server must generate, at a minimum, log records for system startup and shutdown, system access, and system authentication events.
- V-41609 Medium The web server must capture, record, and log all content related to a user session.
- V-41611 Medium The web server must initiate session logging upon start up.
- V-41612 Medium The web server must produce log records containing sufficient information to establish what type of events occurred.
- V-41613 Medium The web server must produce log records containing sufficient information to establish when (date and time) events occurred.
- V-41614 Medium The web server must produce log records containing sufficient information to establish where within the web server the events occurred.
- V-41615 Medium The web server must produce log records containing sufficient information to establish the source of events.
- V-41616 Medium A web server, behind a load balancer or proxy server, must produce log records containing the client IP information as the source and destination and not the load balancer or proxy IP information with each event.
- V-41617 Medium The web server must produce log records that contain sufficient information to establish the outcome (success or failure) of events.
- V-41620 Medium The web server must produce log records containing sufficient information to establish the identity of any user/subject or process associated with an event.
- V-41668 Medium The web server must use the internal system clock to generate time stamps for log records.
- V-41670 Medium Web server log files must only be accessible by privileged users.
- V-41671 Medium The log information from the web server must be protected from unauthorized modification.
- V-41672 Medium The log information from the web server must be protected from unauthorized deletion.
- V-41674 Medium The log data and records from the web server must be backed up onto a different system or media.
- V-41684 Medium Expansion modules must be fully reviewed, tested, and signed before they can exist on a production web server.
- V-41693 Medium The web server must only contain services and functions necessary for operation.
- V-41694 Medium The web server must not be a proxy server.
- V-41695 Medium The web server must provide install options to exclude the installation of documentation, sample code, example applications, and tutorials.
- V-41696 Medium Web server accounts not utilized by installed features (i.e., tools, utilities, specific services, etc.) must not be created and must be deleted when the web server feature is uninstalled.
- V-41698 Medium The web server must provide install options to exclude installation of utility programs, services, plug-ins, and modules not necessary for operation.
- V-41699 Medium The web server must have Multipurpose Internet Mail Extensions (MIME) that invoke OS shell programs disabled.
- V-41700 Medium The web server must allow the mappings to unused and vulnerable scripts to be removed.
- V-41701 Medium The web server must have resource mappings set to disable the serving of certain file types.
- V-41702 Medium The web server must have Web Distributed Authoring (WebDAV) disabled.
- V-41703 Medium The web server must protect system resources and privileged operations from hosted applications.
- V-41704 Medium Users and scripts running on behalf of users must be contained to the document root or home directory tree of the web server.
- V-41706 Medium The web server must be configured to use a specified IP address and port.
- V-41730 Medium The web server must perform RFC 5280-compliant certification path validation.
- V-41731 Medium Only authenticated system administrators or the designated PKI Sponsor for the web server must have access to the web servers private key.
- V-41738 Medium The web server must encrypt passwords during transmission.
- V-41745 Medium The web server must use cryptographic modules that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance when encrypting stored data.
- V-41746 Medium The web server must use cryptographic modules that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.
- V-41794 Medium The web server must separate the hosted applications from hosted web server management functionality.
- V-41807 Medium The web server must generate unique session identifiers that cannot be reliably reproduced.
- V-41808 Medium The web server must generate a session ID long enough that it cannot be guessed through brute force.
- V-41809 Medium The web server must generate a session ID using as much of the character set as possible to reduce the risk of brute force.
- V-41810 Medium The web server must generate unique session identifiers with definable entropy.
- V-41811 Medium The web server must be built to fail to a known safe state if system initialization fails, shutdown fails, or aborts fail.
- V-41812 Medium The web server must provide a clustering capability.
- V-41815 Medium Information at rest must be encrypted using a DoD-accepted algorithm to protect the confidentiality and integrity of the information.
- V-41818 Medium The web server must accept only system-generated session identifiers.
- V-41821 Medium The web server document directory must be in a separate partition from the web servers system files.
- V-41833 Medium The web server must restrict the ability of users to launch Denial of Service (DoS) attacks against other information systems or networks.
- V-41852 Medium The web server must limit the character set used for data entry.
- V-41854 Medium Warning and error messages displayed to clients must be modified to minimize the identity of the web server, patches, loaded modules, and directory paths.
- V-41855 Medium Debugging and trace information used to diagnose the web server must be disabled.
- V-55945 Medium The web server must enforce approved authorizations for logical access to hosted applications and resources in accordance with applicable access control policies.
- V-55947 Medium Non-privileged accounts on the hosting system must only access web server security-relevant information and functions through a distinct administrative account.
- V-55949 Medium The web server must set an inactive timeout for sessions.
- V-55951 Medium The web server must set an absolute timeout for sessions.
- V-55953 Medium Remote access to the web server must follow access policy or work in conjunction with enterprise tools designed to enforce policy requirements.
- V-55955 Medium The web server must provide the capability to immediately disconnect or disable remote access to the hosted applications.
- V-55957 Medium A web server that is part of a web server cluster must route all remote management through a centrally managed access control point.
- V-55959 Medium The web server must use a logging mechanism that is configured to allocate log record storage capacity large enough to accommodate the logging requirements of the web server.
- V-55961 Medium The web server must restrict inbound connections from nonsecure zones.
- V-55969 Medium The web server must not impede the ability to write specified log record content to an audit log server.
- V-55971 Medium The web server must be configurable to integrate with an organizations security infrastructure.
- V-55973 Medium The web server must use a logging mechanism that is configured to alert the ISSO and SA in the event of a processing failure.
- V-55975 Medium The web server must use a logging mechanism that is configured to provide a warning to the ISSO and SA when allocated record storage volume reaches 75% of maximum log record storage capacity.
- V-55977 Medium The web server must record time stamps for log records to a minimum granularity of one second.
- V-55979 Medium The web server must generate log records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
- V-55981 Medium The web server application, libraries, and configuration files must only be accessible to privileged users.
- V-55983 Medium All web server files must be verified for their integrity (e.g., checksums and hashes) before becoming part of the production web server.
- V-55985 Medium The web server must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
- V-55987 Medium All accounts installed with the web server software and tools must have passwords assigned and default passwords changed.
- V-55989 Medium The web server must not perform user management for hosted applications.
- V-55991 Medium The web server must prohibit or restrict the use of nonsecure or unnecessary ports, protocols, modules, and/or services.
- V-55993 Medium Anonymous user access to the web server application directories must be prohibited.
- V-55995 Medium Web server accounts accessing the directory tree, the shell, or other operating system functions and utilities must only be administrative accounts.
- V-55997 Medium The web server must be tuned to handle the operational requirements of the hosted application.
- V-55999 Medium The web server must be protected from being stopped by a non-privileged user.
- V-56001 Medium The web server must employ cryptographic mechanisms (TLS/DTLS/SSL) preventing the unauthorized disclosure of information during transmission.
- V-56003 Medium Web server session IDs must be sent to the client using SSL/TLS.
- V-56005 Medium Web server cookies, such as session cookies, sent to the client using SSL/TLS must not be compressed.
- V-56007 Medium Cookies exchanged between the web server and the client, such as session cookies, must have cookie properties set to prohibit client-side scripts from reading the cookie data.
- V-56009 Medium Cookies exchanged between the web server and the client, such as session cookies, must have cookie properties set to force the encryption of cookies.
- V-56011 Medium A web server must maintain the confidentiality of controlled information during transmission through the use of an approved TLS version.
- V-56013 Medium The web server must maintain the confidentiality and integrity of information during preparation for transmission.
- V-56015 Medium The web server must maintain the confidentiality and integrity of information during reception.
- V-56017 Medium The web server must implement required cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance when encrypting data that must be compartmentalized.
- V-56019 Medium A web server utilizing mobile code must meet DoD-defined mobile code requirements.
- V-56021 Medium The web server must invalidate session identifiers upon hosted application user logout or other session termination.
- V-56023 Medium The web server must generate a unique session identifier for each session using a FIPS 140-2 approved random number generator.
- V-56025 Medium Cookies exchanged between the web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating web server and hosted application.
- V-56027 Medium The web server must only accept client certificates issued by DoD PKI or DoD-approved PKI Certification Authorities (CAs).
- V-56029 Medium The web server must augment re-creation to a stable and known baseline.
- V-56031 Medium The web server must encrypt user identifiers and passwords.
- V-56033 Medium The web server must install security-relevant software updates within the configured time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).
- V-56035 Medium The web server must display a default hosted application web page, not a directory listing, when a requested web page cannot be found.
- V-61353 Medium The web server must remove all export ciphers to protect the confidentiality and integrity of transmitted information.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- SRG-APP-000001-WSR-000001
- Vuln IDs
-
- V-206350
- V-40791
- Rule IDs
-
- SV-206350r395442_rule
- SV-53018
Checks: C-6611r377642_chk
Review the web server documentation and configuration to determine if the number of simultaneous sessions is limited. If the parameter is not configured or is unlimited, this is a finding.
Fix: F-6611r377643_fix
Configure the web server to limit the number of concurrent sessions.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- SRG-APP-000001-WSR-000002
- Vuln IDs
-
- V-206351
- V-40792
- Rule IDs
-
- SV-206351r395442_rule
- SV-53023
Checks: C-6612r377645_chk
Review the web server documentation and configuration to determine if server-side session management is configured. If it is not configured, this is a finding.
Fix: F-6612r377646_fix
Configure the web server to perform server-side session management.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- SRG-APP-000014-WSR-000006
- Vuln IDs
-
- V-206352
- V-40800
- Rule IDs
-
- SV-206352r395466_rule
- SV-53037
Checks: C-6613r377648_chk
Review the web server documentation and configuration to determine the communication methods that are being used. Verify the encryption being used is in accordance with the categorization of data being hosted when remote connections are provided. If it is not, then this is a finding.
Fix: F-6613r377649_fix
Configure the web server to use encryption strength equal to the categorization of data hosted when remote connections are provided.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- SRG-APP-000015-WSR-000014
- Vuln IDs
-
- V-206353
- V-40819
- Rule IDs
-
- SV-206353r395469_rule
- SV-53068
Checks: C-6614r377651_chk
Review the web server documentation and configuration to make certain that the web server is configured to use cryptography to protect the integrity of remote access sessions. If the web server is not configured to use cryptography to protect the integrity of remote access sessions, this is a finding.
Fix: F-6614r377652_fix
Configure the web server to utilize encryption during remote access sessions.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- SRG-APP-000016-WSR-000005
- Vuln IDs
-
- V-206354
- V-40799
- Rule IDs
-
- SV-206354r395472_rule
- SV-53035
Checks: C-6615r377654_chk
Review the web server documentation and configuration to determine if the web server is configured to generate information for external applications monitoring remote access. If a mechanism is not in place providing information to an external application used to monitor and control access, this is a finding.
Fix: F-6615r377655_fix
Configure the web server to provide remote connection information to external monitoring and access control applications.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- SRG-APP-000033-WSR-000169
- Vuln IDs
-
- V-206355
- V-55945
- Rule IDs
-
- SV-206355r395499_rule
- SV-70199
Checks: C-6616r377657_chk
The web server must be configured to perform an authorization check to verify that the authenticated entity should be granted access to the requested content. If the web server does not verify that the authenticated entity is authorized to access the requested content prior to granting access, this is a finding.
Fix: F-6616r377658_fix
Configure the web server to validate the authenticated entity's authorization to access requested content prior to granting access.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SRG-APP-000089-WSR-000047
- Vuln IDs
-
- V-206356
- V-41600
- Rule IDs
-
- SV-206356r395706_rule
- SV-54177
Checks: C-6617r377660_chk
Review the web server documentation and the deployed system configuration to determine if, at a minimum, system startup and shutdown, system access, and system authentication events are logged. If the logs do not include the minimum logable events, this is a finding.
Fix: F-6617r377661_fix
Configure the web server to generate log records for system startup and shutdown, system access, and system authentication events.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001464
- Version
- SRG-APP-000092-WSR-000055
- Vuln IDs
-
- V-206357
- V-41611
- Rule IDs
-
- SV-206357r395715_rule
- SV-54188
Checks: C-6618r377663_chk
Review the web server documentation and deployed configuration to determine if the web server captures log data as soon as the web server is started. If the web server does not capture logable events upon startup, this is a finding.
Fix: F-6618r377664_fix
Configure the web server to capture logable events upon startup.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SRG-APP-000095-WSR-000056
- Vuln IDs
-
- V-206359
- V-41612
- Rule IDs
-
- SV-206359r395721_rule
- SV-54189
Checks: C-6620r377669_chk
Review the web server documentation and deployed configuration to determine if the web server contains sufficient information to establish what type of event occurred. Request a user access the hosted applications, and verify sufficient information is recorded. If sufficient information is not logged, this is a finding.
Fix: F-6620r377670_fix
Configure the web server to record sufficient information to establish what type of events occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- SRG-APP-000096-WSR-000057
- Vuln IDs
-
- V-206360
- V-41613
- Rule IDs
-
- SV-206360r395724_rule
- SV-54190
Checks: C-6621r377672_chk
Review the web server documentation and deployment configuration to determine if the web server is configured to generate a date and time for each logged event. Request a user access the hosted application and generate logable events, and then review the logs to determine if the date and time are included in the log event data. If the date and time are not included, this is a finding.
Fix: F-6621r377673_fix
Configure the web server to log date and time with the event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-APP-000097-WSR-000058
- Vuln IDs
-
- V-206361
- V-41614
- Rule IDs
-
- SV-206361r395727_rule
- SV-54191
Checks: C-6622r377675_chk
Review the web server documentation and deployment configuration to determine if the web server is configured to generate sufficient information to resolve in which process within the web server the log event occurred. Request a user access the hosted application and generate logable events, and then review the logs to determine if the process of the event within the web server can be established. If it cannot be determined where the event occurred, this is a finding.
Fix: F-6622r377676_fix
Configure the web server to generate enough information to determine in what process within the web server the log event occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SRG-APP-000098-WSR-000059
- Vuln IDs
-
- V-206362
- V-41615
- Rule IDs
-
- SV-206362r395730_rule
- SV-54192
Checks: C-6623r377678_chk
Review the web server documentation and deployment configuration to determine if the web server is configured to generate sufficient information to resolve the source, e.g. source IP, of the log event. Request a user access the hosted application and generate logable events, and then review the logs to determine if the source of the event can be established. If the source of the event cannot be determined, this is a finding.
Fix: F-6623r377679_fix
Configure the web server to generate the source of each logable event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SRG-APP-000098-WSR-000060
- Vuln IDs
-
- V-206363
- V-41616
- Rule IDs
-
- SV-206363r395730_rule
- SV-54193
Checks: C-6624r377681_chk
Review the deployment configuration to determine if the web server is sitting behind a proxy server. If the web server is not sitting behind a proxy server, this finding is NA. If the web server is behind a proxy server, review the documentation and deployment configuration to determine if the web server is configured to generate sufficient information to resolve the source, e.g. source IP, of the logged event and not the proxy server. Request a user access the hosted application through the proxy server and generate logable events, and then review the logs to determine if the source of the event can be established. If the source of the event cannot be determined, this is a finding.
Fix: F-6624r377682_fix
Configure the web server to generate the client source, not the load balancer or proxy server, of each logable event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SRG-APP-000099-WSR-000061
- Vuln IDs
-
- V-206364
- V-41617
- Rule IDs
-
- SV-206364r395733_rule
- SV-54194
Checks: C-6625r377684_chk
Review the web server documentation and deployment configuration to determine if the web server is configured to generate the outcome (success or failure) of the event. Request a user access the hosted application and generate logable events, and then review the logs to determine if the outcome of the event can be established. If the outcome of the event cannot be determined, this is a finding.
Fix: F-6625r377685_fix
Configure the web server to generate the outcome, success or failure, as part of each logable event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- SRG-APP-000100-WSR-000064
- Vuln IDs
-
- V-206365
- V-41620
- Rule IDs
-
- SV-206365r395736_rule
- SV-54197
Checks: C-6626r377687_chk
Review the web server documentation and deployment configuration to determine if the web server can generate log data containing the user/subject identity. Request a user access the hosted application and generate logable events, and verify the events contain the user/subject or process identity. If the identity is not part of the log record, this is a finding.
Fix: F-6626r377688_fix
Configure the web server to include the user/subject identity or process as part of each log record.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000139
- Version
- SRG-APP-000108-WSR-000166
- Vuln IDs
-
- V-206366
- V-55973
- Rule IDs
-
- SV-206366r395802_rule
- SV-70227
Checks: C-6627r377690_chk
Review the web server documentation and deployment configuration settings to determine if the web server logging system provides an alert to the ISSO and the SA at a minimum when a processing failure occurs. If alerts are not sent or the web server is not configured to use a dedicated logging tool that meets this requirement, this is a finding.
Fix: F-6627r377691_fix
Configure the web server to provide an alert to the ISSO and SA when log processing failures occur. If the web server cannot generate alerts, utilize an external logging system that meets this criterion.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-000159
- Version
- SRG-APP-000116-WSR-000066
- Vuln IDs
-
- V-206367
- V-41668
- Rule IDs
-
- SV-206367r395817_rule
- SV-54245
Checks: C-6628r377693_chk
Review the web server documentation and deployment configuration to determine if the internal system clock is used for date and time stamps. If this is not feasible, an alternative workaround is to take an action that generates an entry in the log and then immediately query the operating system for the current time. A reasonable match between the two times will suffice as evidence that the system is using the internal clock for date and time stamps. If the web server does not use the internal system clock to generate time stamps, this is a finding.
Fix: F-6628r377694_fix
Configure the web server to use internal system clocks to generate date and time stamps for log records.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- SRG-APP-000118-WSR-000068
- Vuln IDs
-
- V-206368
- V-41670
- Rule IDs
-
- SV-206368r395820_rule
- SV-54247
Checks: C-6629r377696_chk
Review the web server documentation and deployed configuration settings to determine if the web server logging features protect log information from unauthorized access. Review file system settings to verify the log files have secure file permissions. If the web server log files are not protected from unauthorized access, this is a finding.
Fix: F-6629r377697_fix
Configure the web server log files so unauthorized access of log information is not possible.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- SRG-APP-000119-WSR-000069
- Vuln IDs
-
- V-206369
- V-41671
- Rule IDs
-
- SV-206369r395823_rule
- SV-54248
Checks: C-6630r377699_chk
Review the web server documentation and deployed configuration settings to determine if the web server logging features protect log information from unauthorized modification. Review file system settings to verify the log files have secure file permissions. If the web server log files are not protected from unauthorized modification, this is a finding.
Fix: F-6630r377700_fix
Configure the web server log files so unauthorized modification of log information is not possible.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- SRG-APP-000120-WSR-000070
- Vuln IDs
-
- V-206370
- V-41672
- Rule IDs
-
- SV-206370r395826_rule
- SV-54249
Checks: C-6631r377702_chk
Review the web server documentation and deployed configuration settings to determine if the web server logging features protect log information from unauthorized deletion. Review file system settings to verify the log files have secure file permissions. If the web server log files are not protected from unauthorized deletion, this is a finding.
Fix: F-6631r377703_fix
Configure the web server log files so unauthorized deletion of log information is not possible.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001348
- Version
- SRG-APP-000125-WSR-000071
- Vuln IDs
-
- V-206371
- V-41674
- Rule IDs
-
- SV-206371r395838_rule
- SV-54251
Checks: C-6632r377705_chk
Review the web server documentation and deployed configuration to determine if the web server log records are backed up onto an unrelated system or media than the system being logged. If the web server logs are not backed up onto a different system or media than the system being logged, this is a finding.
Fix: F-6632r377706_fix
Configure the web server logs to be backed up onto a different system or media other than the system being logged.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- SRG-APP-000131-WSR-000051
- Vuln IDs
-
- V-206372
- V-55983
- Rule IDs
-
- SV-206372r855034_rule
- SV-70237
Checks: C-6633r377708_chk
Review the web server documentation and deployment configuration to determine if the web server validates files before the files are implemented into the running configuration. If the web server does not meet this requirement and an external facility is not available for use, this is a finding.
Fix: F-6633r377709_fix
Configure the web server to verify object integrity before becoming part of the production web server or utilize an external tool designed to meet this requirement.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- SRG-APP-000131-WSR-000073
- Vuln IDs
-
- V-206373
- V-41684
- Rule IDs
-
- SV-206373r855035_rule
- SV-54261
Checks: C-6634r377711_chk
Review the web server documentation and configuration to determine if web server modules are fully tested before implementation in the production environment. Review the web server for modules identified as test, debug, or backup and that cannot be reached through the hosted application. Review the web server to see if the web server or an external utility is in use to enforce the signing of modules before they are put into a production environment. If development and testing is taking place on the production web server or modules are put into production without being signed, this is a finding.
Fix: F-6634r377712_fix
Configure the web server to enforce, internally or through an external utility, the review, testing and signing of modules before implementation into the production environment.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000015
- Vuln IDs
-
- V-206374
- V-55989
- Rule IDs
-
- SV-206374r395853_rule
- SV-70243
Checks: C-6635r377714_chk
Review the web server documentation and configuration to determine if the web server is being used as a user management application. If the web server is being used to perform user management for the hosted applications, this is a finding.
Fix: F-6635r377715_fix
Configure the web server to disable user management functionality.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000075
- Vuln IDs
-
- V-206375
- V-41693
- Rule IDs
-
- SV-206375r395853_rule
- SV-54270
Checks: C-6636r377717_chk
Review the web server documentation and deployed configuration to determine if web server features, services, and processes are installed that are not needed for hosted application deployment. If excessive features, services, and processes are installed, this is a finding.
Fix: F-6636r377718_fix
Uninstall or deactivate features, services, and processes not needed by the web server for operation.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000076
- Vuln IDs
-
- V-206376
- V-41694
- Rule IDs
-
- SV-206376r395853_rule
- SV-54271
Checks: C-6637r377720_chk
Review the web server documentation and deployed configuration to determine if the web server is also a proxy server. If the web server is also acting as a proxy server, this is a finding.
Fix: F-6637r377721_fix
Uninstall any proxy services, modules, and libraries that are used by the web server to act as a proxy server. Verify all configuration changes are made to assure the web server is no longer acting as a proxy server in any manner.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000077
- Vuln IDs
-
- V-206377
- V-41695
- Rule IDs
-
- SV-206377r395853_rule
- SV-54272
Checks: C-6638r377723_chk
Review the web server documentation and deployment configuration to determine if the web server contains documentation, sample code, example applications, or tutorials. Verify the web server install process also offers an option to exclude these elements from installation and provides an uninstall option for their removal. If web server documentation, sample code, example applications, or tutorials are installed or the web server install process does not offer an option to exclude these elements from installation, this is a finding.
Fix: F-6638r377724_fix
Use the web server uninstall facility or manually remove any documentation, sample code, example applications, and tutorials.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000078
- Vuln IDs
-
- V-206378
- V-41696
- Rule IDs
-
- SV-206378r395853_rule
- SV-54273
Checks: C-6639r377726_chk
Review the web server documentation to determine the user accounts created when particular features are installed. Verify the deployed configuration to determine which features are installed with the web server. If any accounts exist that are not used by the installed features, this is a finding.
Fix: F-6639r377727_fix
Use the web server uninstall facility or manually remove the user accounts not used by the installed web server features.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000080
- Vuln IDs
-
- V-206379
- V-41698
- Rule IDs
-
- SV-206379r395853_rule
- SV-54275
Checks: C-6640r377729_chk
Review the web server documentation and deployment configuration to determine which web server utilities, services, and modules are installed. Verify these options are essential to the operation of the web server. Also, confirm the web server install process offers an option to exclude these utilities, services, and modules from installation that are not needed for operation and that there is an uninstall option for their removal. If there are more utilities, services, or modules installed than are needed for the operation of the web server or the web server does not provide an install facility to customize installation, this is a finding.
Fix: F-6640r377730_fix
Use the web server uninstall facility or manually remove any utility programs, services, or modules not needed by the web server for operation.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000081
- Vuln IDs
-
- V-206380
- V-41699
- Rule IDs
-
- SV-206380r395853_rule
- SV-54276
Checks: C-6641r377732_chk
Review the web server documentation and deployment configuration to determine if the OS shell is accessible by any MIME types that are enabled. If a user of the web server can invoke OS shell programs, this is a finding.
Fix: F-6641r377733_fix
Configure the web server to disable all MIME types that invoke OS shell programs.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000082
- Vuln IDs
-
- V-206381
- V-41700
- Rule IDs
-
- SV-206381r395853_rule
- SV-54277
Checks: C-6642r377735_chk
Review the web server documentation and deployment configuration to determine what script mappings are available. Review the scripts used by the web server and the hosted applications. If there are script mappings in use that are not used by the web server or hosted applications for operation, this is a finding.
Fix: F-6642r377736_fix
Remove script mappings that are not needed for web server and hosted application operation.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000083
- Vuln IDs
-
- V-206382
- V-41701
- Rule IDs
-
- SV-206382r395853_rule
- SV-54278
Checks: C-6643r377738_chk
Review the web server documentation and deployment configuration to determine what types of files are being used for the hosted applications. If the web server is configured to allow other file types not associated with the hosted application, especially those associated with logs, configuration files, passwords, etc., this is a finding.
Fix: F-6643r377739_fix
Configure the web server to only serve file types to the user that are needed by the hosted applications. All other file types must be disabled.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000085
- Vuln IDs
-
- V-206383
- V-41702
- Rule IDs
-
- SV-206383r395853_rule
- SV-54279
Checks: C-6644r377741_chk
Review the web server documentation and deployment configuration to determine if Web Distributed Authoring (WebDAV) is enabled. If WebDAV is enabled, this is a finding.
Fix: F-6644r377742_fix
Configure the web server to disable Web Distributed Authoring.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000086
- Vuln IDs
-
- V-206384
- V-41703
- Rule IDs
-
- SV-206384r395853_rule
- SV-54280
Checks: C-6645r377744_chk
Review the web server documentation and configuration to determine the access to server resources given to hosted applications. If hosted applications have access to more system resources than needed for operation, this is a finding.
Fix: F-6645r377745_fix
Configure the privileges given to hosted applications to the minimum required for application operation.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000087
- Vuln IDs
-
- V-206385
- V-41704
- Rule IDs
-
- SV-206385r395853_rule
- SV-54281
Checks: C-6646r377747_chk
Review the web server documentation and configuration to determine where the document root or home directory for each application hosted by the web server is located. Verify that users of the web server applications, and any scripts running on the user's behalf, are contained to each application's domain. If users of the web server applications, and any scripts running on the user's behalf, are not contained, this is a finding.
Fix: F-6646r377748_fix
Configure the web server to contain users and scripts to each hosted application's domain.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- SRG-APP-000142-WSR-000089
- Vuln IDs
-
- V-206386
- V-41706
- Rule IDs
-
- SV-206386r395856_rule
- SV-54283
Checks: C-6647r377750_chk
Review the web server documentation and deployment configuration to determine whether the web server is configured to listen on a specified IP address and port. Request a client user try to access the web server on any other available IP addresses on the hosting hardware. If an IP address is not configured on the web server or a client can reach the web server on other IP addresses assigned to the hosting hardware, this is a finding.
Fix: F-6647r377751_fix
Configure the web server to only listen on a specified IP address and port.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- SRG-APP-000172-WSR-000104
- Vuln IDs
-
- V-206387
- V-41738
- Rule IDs
-
- SV-206387r397525_rule
- SV-54315
Checks: C-6648r377753_chk
Review the web server documentation and deployed configuration to determine whether passwords are being passed to or from the web server. If the transmission of passwords is not encrypted, this is a finding.
Fix: F-6648r377754_fix
Configure the web server to encrypt the transmission passwords.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- SRG-APP-000175-WSR-000095
- Vuln IDs
-
- V-206388
- V-41730
- Rule IDs
-
- SV-206388r397594_rule
- SV-54307
Checks: C-6649r377756_chk
Review the web server documentation and deployed configuration to determine whether the web server provides PKI functionality that validates certification paths in accordance with RFC 5280. If PKI is not being used, this is NA. If the web server is using PKI, but it does not perform this requirement, this is a finding.
Fix: F-6649r377757_fix
Configure the web server to validate certificates in accordance with RFC 5280.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- SRG-APP-000176-WSR-000096
- Vuln IDs
-
- V-206389
- V-41731
- Rule IDs
-
- SV-206389r397597_rule
- SV-54308
Checks: C-6650r377759_chk
If the web server does not have a private key, this is N/A. Review the web server documentation and deployed configuration to determine whether only authenticated system administrators and the designated PKI Sponsor for the web server can access the web server private key. If the private key is accessible by unauthenticated or unauthorized users, this is a finding.
Fix: F-6650r377760_fix
Configure the web server to ensure only authenticated and authorized users can access the web server's private key.
- RMF Control
- IA-7
- Severity
- H
- CCI
- CCI-000803
- Version
- SRG-APP-000179-WSR-000110
- Vuln IDs
-
- V-206390
- V-41745
- Rule IDs
-
- SV-206390r864574_rule
- SV-54322
Checks: C-6651r377762_chk
Review web server documentation and deployed configuration to determine whether the encryption modules utilized for storage of data are FIPS 140-2 compliant. Reference the following NIST site to identify validated encryption modules: http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm If the encryption modules used for storage of data are not FIPS 140-2 validated, this is a finding.
Fix: F-6651r377763_fix
Configure the web server to utilize FIPS 140-2 approved encryption modules when the web server is storing data.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- SRG-APP-000179-WSR-000111
- Vuln IDs
-
- V-206391
- V-41746
- Rule IDs
-
- SV-206391r397606_rule
- SV-54323
Checks: C-6652r377765_chk
Review web server documentation and deployed configuration to determine whether the encryption modules utilized for authentication are FIPS 140-2 compliant. Reference the following NIST site to identify validated encryption modules: http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm If the encryption modules used for authentication are not FIPS 140-2 validated, this is a finding.
Fix: F-6652r377766_fix
Configure the web server to utilize FIPS 140-2 approved encryption modules when authenticating users and processes.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- SRG-APP-000206-WSR-000128
- Vuln IDs
-
- V-206392
- V-56019
- Rule IDs
-
- SV-206392r397639_rule
- SV-70273
Checks: C-6653r377768_chk
Review the web server documentation and deployed configuration to determine whether mobile code used by hosted applications follows the DoD policies on the acquisition, development, and/or use of mobile code. If the web server is not configured to follow the DoD policies on mobile code, this is a finding.
Fix: F-6653r377769_fix
Configure the web server to follow the DoD policies on mobile code.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- SRG-APP-000211-WSR-000030
- Vuln IDs
-
- V-206393
- V-55995
- Rule IDs
-
- SV-206393r397711_rule
- SV-70249
Checks: C-6654r377771_chk
Review the web server documentation and configuration to determine what web server accounts are available on the hosting server. If non-privileged web server accounts are available with access to functions, directories, or files not needed for the role of the account, this is a finding.
Fix: F-6654r377772_fix
Limit the functions, directories, and files that are accessible by each account and role to administrative accounts and remove or modify non-privileged account access.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- SRG-APP-000211-WSR-000031
- Vuln IDs
-
- V-206394
- V-55993
- Rule IDs
-
- SV-206394r397711_rule
- SV-70247
Checks: C-6655r377774_chk
Review the web server documentation and configuration to determine if anonymous users can make changes to the web server or any applications hosted by the web server. If anonymous users can make changes, this is a finding.
Fix: F-6655r377775_fix
Configure the web server to not allow anonymous users to change the web server or any hosted applications.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- SRG-APP-000211-WSR-000129
- Vuln IDs
-
- V-206395
- V-41794
- Rule IDs
-
- SV-206395r397711_rule
- SV-54371
Checks: C-6656r377777_chk
Review the web server documentation and deployed configuration to determine whether hosted application functionality is separated from web server management functions. If the functions are not separated, this is a finding.
Fix: F-6656r377778_fix
Configure the web server to separate the hosted applications from web server management functionality.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001185
- Version
- SRG-APP-000220-WSR-000201
- Vuln IDs
-
- V-206396
- V-56021
- Rule IDs
-
- SV-206396r397729_rule
- SV-70275
Checks: C-6657r377780_chk
Review the web server documentation and deployed configuration to verify that the web server is configured to invalidate session identifiers when a session is terminated. If the web server does not invalidate session identifiers when a session is terminated, this is a finding.
Fix: F-6657r377781_fix
Configure the web server to invalidate session identifiers when a session is terminated.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001664
- Version
- SRG-APP-000223-WSR-000011
- Vuln IDs
-
- V-206397
- V-56025
- Rule IDs
-
- SV-206397r397732_rule
- SV-70279
Checks: C-6658r377783_chk
Review the web server documentation and configuration to determine if cookies between the web server and client are accessible by applications or web servers other than the originating pair. If the cookie information is accessible outside the originating pair, this is a finding.
Fix: F-6658r377784_fix
Configure the web server to set properties within cookies to disallow the cookie to be accessed by other web servers and applications.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001664
- Version
- SRG-APP-000223-WSR-000145
- Vuln IDs
-
- V-206398
- V-41818
- Rule IDs
-
- SV-206398r397732_rule
- SV-54395
Checks: C-6659r377786_chk
Review the web server documentation and deployed configuration to determine whether the web server accepts session IDs that are not system-generated. If the web server does accept non-system-generated session IDs, this is a finding.
Fix: F-6659r377787_fix
Configure the web server to only accept session IDs that are created by the web server.
- RMF Control
- SC-23
- Severity
- H
- CCI
- CCI-001188
- Version
- SRG-APP-000224-WSR-000135
- Vuln IDs
-
- V-206399
- V-56023
- Rule IDs
-
- SV-206399r864573_rule
- SV-70277
Checks: C-6660r377789_chk
Review the web server documentation and deployed configuration to verify that the web server is configured to generate unique session identifiers with a FIPS 140-2 approved random number generator. Request two users access the web server and view the session identifier generated for each user to verify that the session IDs are not sequential. If the web server is not configured to generate unique session identifiers or the random number generator is not FIPS 140-2 approved, this is a finding.
Fix: F-6660r377790_fix
Configure the web server to generate unique session identifiers using a FIPS 140-2 random number generator.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001188
- Version
- SRG-APP-000224-WSR-000136
- Vuln IDs
-
- V-206400
- V-41807
- Rule IDs
-
- SV-206400r397735_rule
- SV-54384
Checks: C-6661r377792_chk
Review the web server documentation and deployed configuration to verify that random and unique session identifiers are generated. Access the web server ID generator function and generate two IDs using the same input. If the web server is not configured to generate random and unique session identifiers, or the ID generator generates the same ID for the same input, this is a finding.
Fix: F-6661r377793_fix
Configure the web server to generate random and unique session identifiers that cannot be reliably reproduced.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001188
- Version
- SRG-APP-000224-WSR-000137
- Vuln IDs
-
- V-206401
- V-41808
- Rule IDs
-
- SV-206401r397735_rule
- SV-54385
Checks: C-6662r377795_chk
Review the web server documentation and deployed configuration to see how long the generated session identifiers are. If the web server is not configured to generate session identifiers that are at least 128 bits (16 bytes) in length, this is a finding.
Fix: F-6662r377796_fix
Configure the web server to generate session identifiers that are at least 128 bits in length.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001188
- Version
- SRG-APP-000224-WSR-000138
- Vuln IDs
-
- V-206402
- V-41809
- Rule IDs
-
- SV-206402r397735_rule
- SV-54386
Checks: C-6663r377798_chk
Review the web server documentation and deployed configuration to determine what characters are used in generating session IDs. If the web server is not configured to use at least A-Z, a-z, and 0-9 to generate session identifiers, this is a finding.
Fix: F-6663r377799_fix
Configure the web server to use at least A-Z, a-z, and 0-9 to generate session IDs.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001188
- Version
- SRG-APP-000224-WSR-000139
- Vuln IDs
-
- V-206403
- V-41810
- Rule IDs
-
- SV-206403r397735_rule
- SV-54387
Checks: C-6664r377801_chk
Review the web server documentation and deployed configuration to verify that the web server is generating random session IDs with entropy equal to at least half the session ID length. If the web server is not configured to generate random session IDs with the proper amount of entropy, this is a finding.
Fix: F-6664r377802_fix
Configure the web server to generate random session IDs with minimum entropy equal to half the session ID length.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-APP-000225-WSR-000074
- Vuln IDs
-
- V-206404
- V-56029
- Rule IDs
-
- SV-206404r397738_rule
- SV-70283
Checks: C-6665r377804_chk
Review the web server documentation and deployed configuration to determine if the web server offers the capability to reinstall from a known state. If the web server does not offer this capability, determine if the web server, in any manner, prohibits the reinstallation of a known state. If the web server does prohibit the reinstallation to a known state, this is a finding.
Fix: F-6665r377805_fix
Configure the web server to augment and not hinder the reinstallation of a known and stable baseline.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-APP-000225-WSR-000140
- Vuln IDs
-
- V-206405
- V-41811
- Rule IDs
-
- SV-206405r397738_rule
- SV-54388
Checks: C-6666r377807_chk
Review the web server documentation, deployed configuration, and risk analysis documentation to determine whether the web server will fail to known states for system initialization, shutdown, or abort failures. If the web server will not fail to known state, this is a finding.
Fix: F-6666r377808_fix
Configure the web server to fail to the states of operation during system initialization, shutdown, or abort failures found in the risk analysis.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-APP-000225-WSR-000141
- Vuln IDs
-
- V-206406
- V-41812
- Rule IDs
-
- SV-206406r397738_rule
- SV-54389
Checks: C-6667r377810_chk
Review the web server documentation, deployed configuration, and risk analysis documentation to verify that the web server is configured to provide clustering functionality, if the web server is a high-availability web server. If the web server is not a high-availability web server, this finding is NA. If the web server is not configured to provide clustering or some form of failover functionality and the web server is a high-availability server, this is a finding.
Fix: F-6667r377811_fix
Configure the web server to provide application failover, or participate in a web cluster that provides failover for high-availability web servers.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- SRG-APP-000231-WSR-000144
- Vuln IDs
-
- V-206407
- V-41815
- Rule IDs
-
- SV-206407r397744_rule
- SV-54392
Checks: C-6668r377813_chk
Review the web server documentation and deployed configuration to locate where potential data at rest is stored. Verify that the data is encrypted using a DoD-accepted algorithm to protect the confidentiality and integrity of the information. If the data is not encrypted using a DoD-accepted algorithm, this is a finding.
Fix: F-6668r377814_fix
Use a DoD-accepted algorithm to encrypt data at rest to protect the information's confidentiality and integrity.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- SRG-APP-000233-WSR-000146
- Vuln IDs
-
- V-206408
- V-41821
- Rule IDs
-
- SV-206408r397747_rule
- SV-54398
Checks: C-6669r377816_chk
Review the web server documentation and deployed configuration to determine where the document directory is located for each hosted application. If the document directory is not in a separate partition from the web server's system files, this is a finding.
Fix: F-6669r377817_fix
Configure the web server to place the document directories in a separate partition from the web server system files.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- SRG-APP-000246-WSR-000149
- Vuln IDs
-
- V-206409
- V-41833
- Rule IDs
-
- SV-206409r397828_rule
- SV-54410
Checks: C-6670r377819_chk
Review the web server documentation and deployed configuration to determine whether the web server has been configured to limit the ability of the web server to be used in a DoS attack. If not, this is a finding.
Fix: F-6670r377820_fix
Configure the web server to limit the ability of users to use the web server in a DoS attack.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- SRG-APP-000251-WSR-000157
- Vuln IDs
-
- V-206410
- V-41852
- Rule IDs
-
- SV-206410r397834_rule
- SV-54429
Checks: C-6671r377822_chk
Review the web server documentation and deployed configuration to determine what the data set is for data entry. If the web server does not limit the data set used for data entry, this is a finding.
Fix: F-6671r377823_fix
Configure the web server to only accept the character sets expected by the hosted applications.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- SRG-APP-000266-WSR-000142
- Vuln IDs
-
- V-206411
- V-56035
- Rule IDs
-
- SV-206411r397843_rule
- SV-70289
Checks: C-6672r377825_chk
Review the web server documentation and deployed configuration to locate all the web document directories. Verify that each web document directory contains a default hosted application web page that can be used by the web server in the event a web page cannot be found. If a document directory does not contain a default web page, this is a finding.
Fix: F-6672r377826_fix
Place a default web page in every web document directory.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- SRG-APP-000266-WSR-000159
- Vuln IDs
-
- V-206412
- V-41854
- Rule IDs
-
- SV-206412r397843_rule
- SV-54431
Checks: C-6673r377828_chk
Review the web server documentation and deployed configuration to determine whether the web server offers different modes of operation that will minimize the identity of the web server, patches, loaded modules, and directory paths given to clients on error conditions. If the web server is not configured to minimize the information given to clients, this is a finding.
Fix: F-6673r377829_fix
Configure the web server to minimize the information provided to the client in warning and error messages.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- SRG-APP-000266-WSR-000160
- Vuln IDs
-
- V-206413
- V-41855
- Rule IDs
-
- SV-206413r397843_rule
- SV-54432
Checks: C-6674r377831_chk
Review the web server documentation and deployed configuration to determine if debugging and trace information are enabled. If the web server is configured with debugging and trace information enabled, this is a finding.
Fix: F-6674r377832_fix
Configure the web server to minimize the information given to clients on error conditions by disabling debugging and trace information.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- SRG-APP-000295-WSR-000012
- Vuln IDs
-
- V-206414
- V-55951
- Rule IDs
-
- SV-206414r855036_rule
- SV-70205
Checks: C-6675r377834_chk
Review the web server documentation and deployed configuration to verify that the web server is configured to close sessions after an absolute period of time. If the web server is not configured to close sessions after an absolute period of time, this is a finding.
Fix: F-6675r377835_fix
Configure the web server to close sessions after an absolute period of time.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- SRG-APP-000295-WSR-000134
- Vuln IDs
-
- V-206415
- V-55949
- Rule IDs
-
- SV-206415r855037_rule
- SV-70203
Checks: C-6676r377837_chk
Review the hosted applications, web server documentation and deployed configuration to verify that the web server will close an open session after a configurable time of inactivity. If the web server does not close sessions after a configurable time of inactivity or the amount of time is configured higher than 5 minutes for high-risk applications, 10 minutes for medium-risk applications, or 20 minutes for low-risk applications, this is a finding.
Fix: F-6676r377838_fix
Configure the web server to close inactive sessions after 5 minutes for high-risk applications, 10 minutes for medium-risk applications, or 20 minutes for low-risk applications.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- SRG-APP-000315-WSR-000003
- Vuln IDs
-
- V-206416
- V-55953
- Rule IDs
-
- SV-206416r855038_rule
- SV-70207
Checks: C-6677r377840_chk
Review the web server product documentation and deployed configuration to determine if the server or an enterprise tool is enforcing the organization's requirements for remote connections. If the web server is not configured to enforce these requirements and an enterprise tool is not in place, this is a finding.
Fix: F-6677r377841_fix
Configure the web server to enforce the remote access policy or to work with an enterprise tool designed to enforce the policy.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- SRG-APP-000315-WSR-000004
- Vuln IDs
-
- V-206417
- V-55961
- Rule IDs
-
- SV-206417r855039_rule
- SV-70215
Checks: C-6678r377843_chk
Review the web server configuration to verify that the web server is restricting access from nonsecure zones. If the web server is not configured to restrict access from nonsecure zones, then this is a finding.
Fix: F-6678r377844_fix
Configure the web server to block access from DoD-defined nonsecure zones.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002322
- Version
- SRG-APP-000316-WSR-000170
- Vuln IDs
-
- V-206418
- V-55955
- Rule IDs
-
- SV-206418r855040_rule
- SV-70209
Checks: C-6679r377846_chk
Review the web server documentation and configuration to make certain that the web server is configured to allow for the immediate disconnection or disabling of remote access to hosted applications when necessary. If the web server is not capable of or cannot be configured to disconnect or disable remote access to the hosted applications when necessary, this is a finding.
Fix: F-6679r377847_fix
Configure the web server to provide the capability to immediately disconnect or disable remote access to the hosted applications.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- SRG-APP-000340-WSR-000029
- Vuln IDs
-
- V-206419
- V-55947
- Rule IDs
-
- SV-206419r855041_rule
- SV-70201
Checks: C-6680r377849_chk
Review the web server documentation and configuration to determine if accounts used for administrative duties of the web server are separated from non-privileged accounts. If non-privileged accounts can access web server security-relevant information, this is a finding.
Fix: F-6680r377850_fix
Set up accounts and roles that can be used to perform web server security-relevant tasks and remove or modify non-privileged account access to security-relevant tasks.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001844
- Version
- SRG-APP-000356-WSR-000007
- Vuln IDs
-
- V-206420
- V-55957
- Rule IDs
-
- SV-206420r855042_rule
- SV-70211
Checks: C-6681r377852_chk
Review the web server documentation and configuration to determine if the web server is part of a cluster. If the web server is not part of a cluster, then this is NA. If the web server is part of a cluster and is not centrally managed, then this is a finding.
Fix: F-6681r377853_fix
Configure the web server to be centrally managed.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- SRG-APP-000357-WSR-000150
- Vuln IDs
-
- V-206421
- V-55959
- Rule IDs
-
- SV-206421r855043_rule
- SV-70213
Checks: C-6682r377855_chk
Review the web server documentation and deployment configuration to determine if the web server is using a logging mechanism to store log records. If a logging mechanism is in use, validate that the mechanism is configured to use record storage capacity in accordance with specifications within NIST SP 800-92 for log record storage requirements. If the web server is not using a logging mechanism, or if the mechanism has not been configured to allocate log record storage capacity in accordance with NIST SP 800-92, this is a finding.
Fix: F-6682r377856_fix
Configure the web server to use a logging mechanism that is configured to allocate log record storage capacity in accordance with NIST SP 800-92 log record storage requirements.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-APP-000358-WSR-000063
- Vuln IDs
-
- V-206422
- V-55969
- Rule IDs
-
- SV-206422r855044_rule
- SV-70223
Checks: C-6683r377858_chk
Review the web server documentation and deployment configuration to determine if the web server can write log data to, or if log data can be transferred to, a separate audit server. Request a user access the hosted application and generate logable events and verify the data is written to a separate audit server. If logs cannot be directly written or transferred on request or on a periodic schedule to an audit log server, this is a finding.
Fix: F-6683r377859_fix
Configure the web server to directly write or transfer the logs to a remote audit log server.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-APP-000358-WSR-000163
- Vuln IDs
-
- V-206423
- V-55971
- Rule IDs
-
- SV-206423r855045_rule
- SV-70225
Checks: C-6684r377861_chk
Review the web server documentation and deployed configuration to determine whether the web server is logging security-relevant events. Determine whether there is a security tool in place that allows review and alert capabilities and whether the web server is sending events to this system. If the web server is not, this is a finding.
Fix: F-6684r377862_fix
Configure the web server to send logged events to the organization's security infrastructure tool that offers review and alert capabilities.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- SRG-APP-000359-WSR-000065
- Vuln IDs
-
- V-206424
- V-55975
- Rule IDs
-
- SV-206424r855046_rule
- SV-70229
Checks: C-6685r377864_chk
Review the web server documentation and deployment configuration settings to determine if the web server log system provides a warning to the ISSO and SA when allocated record storage volume reaches 75% of maximum record storage capacity. If designated alerts are not sent or the web server is not configured to use a dedicated log tool that meets this requirement, this is a finding.
Fix: F-6685r377865_fix
Configure the web server to provide a warning to the ISSO and SA when allocated log record storage volume reaches 75% of maximum record storage capacity.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001890
- Version
- SRG-APP-000374-WSR-000172
- Vuln IDs
-
- V-206425
- V-55979
- Rule IDs
-
- SV-206425r855047_rule
- SV-70233
Checks: C-6686r377867_chk
Review the web server documentation and configuration to determine the time stamp format for log data. If the time stamp is not mapped to UTC or GMT time, this is a finding.
Fix: F-6686r377868_fix
Configure the web server to store log data time stamps in a format that is mapped to UTC or GMT time.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001889
- Version
- SRG-APP-000375-WSR-000171
- Vuln IDs
-
- V-206426
- V-55977
- Rule IDs
-
- SV-206426r855048_rule
- SV-70231
Checks: C-6687r377870_chk
Review the web server documentation and configuration to determine if log records are time stamped to a minimum granularity of one second. Have a user generate a logable event and review the log data to determine if the web server is configured correctly. If the log data does not contain a time stamp to a minimum granularity of one second, this is a finding.
Fix: F-6687r377871_fix
Configure the web server to record log events with a time stamp to a granularity of one second.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- SRG-APP-000380-WSR-000072
- Vuln IDs
-
- V-206427
- V-55981
- Rule IDs
-
- SV-206427r855049_rule
- SV-70235
Checks: C-6688r377873_chk
Review the web server documentation and configuration to determine if the web server provides unique account roles specifically for the purposes of segmenting the responsibilities for managing the web server. Log into the hosting server using a web server role with limited permissions (e.g., Auditor, Developer, etc.) and verify the account is not able to perform configuration changes that are not related to that role. If roles are not defined with limited permissions and restrictions, this is a finding.
Fix: F-6688r377874_fix
Define roles and responsibilities to be used when managing the web server. Configure the hosting system to utilize specific roles that restrict access related to web server system and configuration changes.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- SRG-APP-000383-WSR-000175
- Vuln IDs
-
- V-206428
- V-55991
- Rule IDs
-
- SV-206428r855050_rule
- SV-70245
Checks: C-6689r377876_chk
Review the web server documentation and deployment configuration to determine which ports and protocols are enabled. Verify that the ports and protocols being used are permitted, necessary for the operation of the web server and the hosted applications and are secure for a production system. If any of the ports or protocols are not permitted, are nonsecure or are not necessary for web server operation, this is a finding.
Fix: F-6689r377877_fix
Configure the web server to disable any ports or protocols that are not permitted, are nonsecure for a production web server or are not necessary for web server operation.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-002470
- Version
- SRG-APP-000427-WSR-000186
- Vuln IDs
-
- V-206430
- V-56027
- Rule IDs
-
- SV-206430r855051_rule
- SV-70281
Checks: C-6691r377882_chk
Review the web server deployed configuration to determine if the web server will accept client certificates issued by unapproved PKIs. The authoritative list of DoD-approved PKIs is published at http://iase.disa.mil/pki-pke/interoperability. If the web server will accept non-DoD approved PKI client certificates, this is a finding.
Fix: F-6691r377883_fix
Configure the web server to only accept DoD and DoD-approved PKI client certificates.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002476
- Version
- SRG-APP-000429-WSR-000113
- Vuln IDs
-
- V-206431
- V-56031
- Rule IDs
-
- SV-206431r855052_rule
- SV-70285
Checks: C-6692r377885_chk
Review the web server documentation and deployed configuration to determine whether the web server is authorizing and managing users. If the web server is not authorizing and managing users, this is NA. If the web server is the user authenticator and manager, verify that stored user identifiers and passwords are being encrypted by the web server. If the user information is not being encrypted when stored, this is a finding.
Fix: F-6692r377886_fix
Configure the web server to encrypt the user identifiers and passwords when storing them on digital media.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-APP-000435-WSR-000147
- Vuln IDs
-
- V-206432
- V-55999
- Rule IDs
-
- SV-206432r855053_rule
- SV-70253
Checks: C-6693r377888_chk
Review the web server documentation and deployed configuration to determine where the process ID is stored and which utilities are used to start/stop the web server. Determine whether the process ID and the utilities are protected from non-privileged users. If they are not protected, this is a finding.
Fix: F-6693r377889_fix
Remove or modify non-privileged account access to the web server process ID and the utilities used for starting/stopping the web server.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-APP-000435-WSR-000148
- Vuln IDs
-
- V-206433
- V-55997
- Rule IDs
-
- SV-206433r855054_rule
- SV-70251
Checks: C-6694r377891_chk
Review the web server documentation and deployed configuration to determine what parameters are set to tune the web server. Review the hosted applications along with risk analysis documents to determine the expected user traffic. If the web server has not been tuned to avoid a DoS, this is a finding.
Fix: F-6694r377892_fix
Analyze the expected user traffic for the hosted applications. Tune the web server to avoid a DoS condition under normal user traffic to the hosted applications.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-APP-000439-WSR-000151
- Vuln IDs
-
- V-206434
- V-56001
- Rule IDs
-
- SV-206434r855055_rule
- SV-70255
Checks: C-6695r377894_chk
Review the web server documentation and deployed configuration to determine whether the transmission of data between the web server and external devices is encrypted. If the web server does not encrypt the transmission, this is a finding.
Fix: F-6695r377895_fix
Configure the web server to encrypt the transmission of data between the web server and external devices.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-APP-000439-WSR-000152
- Vuln IDs
-
- V-206435
- V-56003
- Rule IDs
-
- SV-206435r855056_rule
- SV-70257
Checks: C-6696r377897_chk
Review the web server documentation and deployed configuration to determine whether the session identifier is being sent to the client encrypted. If the web server does not encrypt the session identifier, this is a finding.
Fix: F-6696r377898_fix
Configure the web server to encrypt the session identifier for transmission to the client.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-APP-000439-WSR-000153
- Vuln IDs
-
- V-206436
- V-56005
- Rule IDs
-
- SV-206436r855057_rule
- SV-70259
Checks: C-6697r377900_chk
Review the web server documentation and deployed configuration to determine whether cookies are being sent to the client using SSL/TLS. If the transmission is through a SSL/TLS connection, but the cookie is not being compressed, this finding is NA. If the web server is using SSL/TLS for cookie transmission and the cookie is also being compressed, this is a finding.
Fix: F-6697r377901_fix
Configure the web server to send the cookie to the client via SSL/TLS without using cookie compression.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-APP-000439-WSR-000154
- Vuln IDs
-
- V-206437
- V-56007
- Rule IDs
-
- SV-206437r855058_rule
- SV-70261
Checks: C-6698r377903_chk
Review the web server documentation and deployed configuration to determine how to disable client-side scripts from reading cookies. If the web server is not configured to disallow client-side scripts from reading cookies, this is a finding.
Fix: F-6698r377904_fix
Configure the web server to disallow client-side scripts the capability of reading cookie information.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-APP-000439-WSR-000155
- Vuln IDs
-
- V-206438
- V-56009
- Rule IDs
-
- SV-206438r855059_rule
- SV-70263
Checks: C-6699r377906_chk
Review the web server documentation and deployed configuration to verify that cookies are encrypted before transmission. If the web server is not configured to encrypt cookies, this is a finding.
Fix: F-6699r377907_fix
Configure the web server to encrypt cookies before transmission.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-APP-000439-WSR-000156
- Vuln IDs
-
- V-206439
- V-56011
- Rule IDs
-
- SV-206439r855060_rule
- SV-70265
Checks: C-6700r377909_chk
Review the web server documentation and deployed configuration to determine which version of TLS is being used. If the TLS version is not an approved version according to NIST SP 800-52 or non-FIPS-approved algorithms are enabled, this is a finding.
Fix: F-6700r377910_fix
Configure the web server to use an approved TLS version according to NIST SP 800-52 and to disable all non-approved versions.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-APP-000439-WSR-000188
- Vuln IDs
-
- V-206440
- V-61353
- Rule IDs
-
- SV-206440r855061_rule
- SV-75835
Checks: C-6701r377912_chk
Review the web server documentation and deployed configuration to determine if export ciphers are removed. If the web server does not have the export ciphers removed, this is a finding.
Fix: F-6701r377913_fix
Configure the web server to have export ciphers removed.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002420
- Version
- SRG-APP-000441-WSR-000181
- Vuln IDs
-
- V-206441
- V-56013
- Rule IDs
-
- SV-206441r855062_rule
- SV-70267
Checks: C-6702r377915_chk
Review the web server documentation and deployed configuration to determine if the web server maintains the confidentiality and integrity of information during preparation before transmission. If the confidentiality and integrity are not maintained, this is a finding.
Fix: F-6702r377916_fix
Configure the web server to maintain the confidentiality and integrity of information during preparation for transmission.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002422
- Version
- SRG-APP-000442-WSR-000182
- Vuln IDs
-
- V-206442
- V-56015
- Rule IDs
-
- SV-206442r855063_rule
- SV-70269
Checks: C-6703r377918_chk
Review web server configuration to determine if the server is using a transmission method that maintains the confidentiality and integrity of information during reception. If a transmission method is not being used that maintains the confidentiality and integrity of the data during reception, this is a finding.
Fix: F-6703r377919_fix
Configure the web server to utilize a transmission method that maintains the confidentiality and integrity of information during reception.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- SRG-APP-000456-WSR-000187
- Vuln IDs
-
- V-206443
- V-56033
- Rule IDs
-
- SV-206443r855064_rule
- SV-70287
Checks: C-6704r377921_chk
Review the web server documentation and configuration to determine if the web server checks for patches from an authoritative source at least every 30 days. If there is no timeframe or the timeframe is greater than 30 days, this is a finding.
Fix: F-6704r377922_fix
Configure the web server to check for patches and updates from an authoritative source at least every 30 days.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-WSR-000079
- Vuln IDs
-
- V-206444
- V-55987
- Rule IDs
-
- SV-206444r401224_rule
- SV-70241
Checks: C-6705r377924_chk
Review the web server documentation and deployment configuration to determine what non-service/system accounts were installed by the web server installation process. Verify the passwords for these accounts have been set and/or changed from the default passwords. If these accounts still have no password or default passwords, this is a finding.
Fix: F-6705r377925_fix
Set passwords for non-service/system accounts containing no passwords and change the passwords for accounts which still have default passwords.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-WSR-000174
- Vuln IDs
-
- V-206445
- V-55985
- Rule IDs
-
- SV-206445r401224_rule
- SV-70239
Checks: C-6706r377927_chk
Review the web server documentation and deployed configuration to determine if web server is configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance. If the web server is not configured according to the guidance, this is a finding.
Fix: F-6706r377928_fix
Configure the web server to be configured according to DoD security configuration guidance.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-APP-000416-WSR-000118
- Vuln IDs
-
- V-239371
- V-56017
- Rule IDs
-
- SV-239371r855065_rule
- SV-70271
Checks: C-42604r659514_chk
Review policy documents to identify data that is compartmentalized (i.e. classified, sensitive, need-to-know, etc.) and requires cryptographic protection. Review the web server documentation and deployed configuration to identify the encryption modules utilized to protect the compartmentalized data. If the encryption modules used to protect the compartmentalized data are not compliant with the data, this is a finding.
Fix: F-42563r659515_fix
Configure the web server to utilize cryptography when protecting compartmentalized data.