Web Server Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +30 −8 ✎ 1
Comparison against the immediately-prior release (V3R3). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 30
- V-264337 Medium The web server must disable accounts when the accounts have expired.
- V-264338 Medium The web server must disable accounts when the accounts are no longer associated to a user.
- V-264339 Medium The web server must implement the capability to centrally review and analyze audit records from multiple components within the system.
- V-264340 Medium The web server must alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information.
- V-264341 Medium The web server must automatically generate audit records of the enforcement actions.
- V-264342 Medium The web server must require users to be individually authenticated before granting access to the shared accounts or resources.
- V-264343 Medium The web server must implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access.
- V-264344 Medium The web server must implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements.
- V-264345 Medium The web server must, for password-based authentication, maintain a list of commonly used, expected, or compromised passwords on an organization-defined frequency.
- V-264346 Medium The web server must, for password-based authentication, update the list of passwords on an organization-defined frequency.
- V-264347 Medium The web server must, for password-based authentication, update the list of passwords when organizational passwords are suspected to have been compromised directly or indirectly.
- V-264348 Medium The web server must, for password-based authentication, verify when users create or update passwords, that the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a).
- V-264349 Medium The web server must, for password-based authentication, store passwords using an approved salted key derivation function, preferably using a keyed hash.
- V-264350 Medium The web server must, for password-based authentication, require immediate selection of a new password upon account recovery.
- V-264351 Medium The web server must, for password-based authentication, allow user selection of long passwords and passphrases, including spaces and all printable characters.
- V-264352 Medium The web server must, for password-based authentication, employ automated tools to assist the user in selecting strong password authenticators.
- V-264353 Medium The web server must, for password-based authentication, enforce organization-defined composition and complexity rules.
- V-264354 Medium The web server must, for public key-based authentication, implement a local cache of revocation data to support path discovery and validation.
- V-264355 Medium The web server must protect nonlocal maintenance sessions by separating the maintenance session from other network sessions with the system by logically separated communications paths.
- V-264356 Medium The web server must include only approved trust anchors in trust stores or certificate stores managed by the organization.
- V-264357 Medium The web server must provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store.
- V-264358 Medium The web server must synchronize system clocks within and between systems or system components.
- V-264359 Medium The web server must compare the internal system clocks on an organization-defined frequency with organization-defined authoritative time source.
- V-264360 Medium The web server must restrict a consistent inbound source IP for the entire management session.
- V-264361 Info The web server must restrict a consistent inbound source IP for the entire user session.
- V-264362 Medium The web server must use HTTP/2, at a minimum.
- V-264363 Medium The web server must disable HTTP/1.x downgrading.
- V-264364 Medium The web server must interpret and normalize ambiguous HTTP requests or terminate the TCP connection.
- V-264365 Medium The web server must terminate the connection if server-level exceptions are triggered when handling requests to prevent HTTP request smuggling attacks.
- V-264366 Medium The web server must only use forward proxies that route HTTP/2 requests upstream.
Removed rules 8
- V-206420 Medium A web server that is part of a web server cluster must route all remote management through a centrally managed access control point.
- V-260896 Medium The web server must restrict a consistent inbound source IP for the entire management session.
- V-260897 Info The web server must restrict a consistent inbound source IP for the entire user session.
- V-260898 Medium The web server must use HTTP/2, at a minimum.
- V-260899 Medium The web server must disable HTTP/1.x downgrading.
- V-260900 Medium The web server must interpret and normalize ambiguous HTTP requests or terminate the TCP connection.
- V-260901 Medium The web server must terminate the connection if server-level exceptions are triggered when handling requests to prevent HTTP request smuggling attacks.
- V-260902 Medium The web server must only use forward proxies that route HTTP/2 requests upstream.
Content changes 1
- V-206372 Medium description All web server files must be verified for their integrity (e.g., checksums and hashes) before becoming part of the production web server.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- SRG-APP-000001-WSR-000001
- Vuln IDs
-
- V-206350
- V-40791
- Rule IDs
-
- SV-206350r960735_rule
- SV-53018
Checks: C-6611r377642_chk
Review the web server documentation and configuration to determine if the number of simultaneous sessions is limited. If the parameter is not configured or is unlimited, this is a finding.
Fix: F-6611r377643_fix
Configure the web server to limit the number of concurrent sessions.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- SRG-APP-000001-WSR-000002
- Vuln IDs
-
- V-206351
- V-40792
- Rule IDs
-
- SV-206351r960735_rule
- SV-53023
Checks: C-6612r377645_chk
Review the web server documentation and configuration to determine if server-side session management is configured. If it is not configured, this is a finding.
Fix: F-6612r377646_fix
Configure the web server to perform server-side session management.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- SRG-APP-000014-WSR-000006
- Vuln IDs
-
- V-206352
- V-40800
- Rule IDs
-
- SV-206352r960759_rule
- SV-53037
Checks: C-6613r377648_chk
Review the web server documentation and configuration to determine the communication methods that are being used. Verify the encryption being used is in accordance with the categorization of data being hosted when remote connections are provided. If it is not, then this is a finding.
Fix: F-6613r377649_fix
Configure the web server to use encryption strength equal to the categorization of data hosted when remote connections are provided.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- SRG-APP-000015-WSR-000014
- Vuln IDs
-
- V-206353
- V-40819
- Rule IDs
-
- SV-206353r960762_rule
- SV-53068
Checks: C-6614r377651_chk
Review the web server documentation and configuration to make certain that the web server is configured to use cryptography to protect the integrity of remote access sessions. If the web server is not configured to use cryptography to protect the integrity of remote access sessions, this is a finding.
Fix: F-6614r377652_fix
Configure the web server to utilize encryption during remote access sessions.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- SRG-APP-000016-WSR-000005
- Vuln IDs
-
- V-206354
- V-40799
- Rule IDs
-
- SV-206354r960765_rule
- SV-53035
Checks: C-6615r377654_chk
Review the web server documentation and configuration to determine if the web server is configured to generate information for external applications monitoring remote access. If a mechanism is not in place providing information to an external application used to monitor and control access, this is a finding.
Fix: F-6615r377655_fix
Configure the web server to provide remote connection information to external monitoring and access control applications.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- SRG-APP-000033-WSR-000169
- Vuln IDs
-
- V-206355
- V-55945
- Rule IDs
-
- SV-206355r960792_rule
- SV-70199
Checks: C-6616r377657_chk
The web server must be configured to perform an authorization check to verify that the authenticated entity should be granted access to the requested content. If the web server does not verify that the authenticated entity is authorized to access the requested content prior to granting access, this is a finding.
Fix: F-6616r377658_fix
Configure the web server to validate the authenticated entity's authorization to access requested content prior to granting access.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SRG-APP-000089-WSR-000047
- Vuln IDs
-
- V-206356
- V-41600
- Rule IDs
-
- SV-206356r960879_rule
- SV-54177
Checks: C-6617r377660_chk
Review the web server documentation and the deployed system configuration to determine if, at a minimum, system startup and shutdown, system access, and system authentication events are logged. If the logs do not include the minimum logable events, this is a finding.
Fix: F-6617r377661_fix
Configure the web server to generate log records for system startup and shutdown, system access, and system authentication events.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001464
- Version
- SRG-APP-000092-WSR-000055
- Vuln IDs
-
- V-206357
- V-41611
- Rule IDs
-
- SV-206357r960888_rule
- SV-54188
Checks: C-6618r377663_chk
Review the web server documentation and deployed configuration to determine if the web server captures log data as soon as the web server is started. If the web server does not capture logable events upon startup, this is a finding.
Fix: F-6618r377664_fix
Configure the web server to capture logable events upon startup.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SRG-APP-000095-WSR-000056
- Vuln IDs
-
- V-206359
- V-41612
- Rule IDs
-
- SV-206359r962395_rule
- SV-54189
Checks: C-6620r377669_chk
Review the web server documentation and deployed configuration to determine if the web server contains sufficient information to establish what type of event occurred. Request a user access the hosted applications, and verify sufficient information is recorded. If sufficient information is not logged, this is a finding.
Fix: F-6620r377670_fix
Configure the web server to record sufficient information to establish what type of events occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- SRG-APP-000096-WSR-000057
- Vuln IDs
-
- V-206360
- V-41613
- Rule IDs
-
- SV-206360r960894_rule
- SV-54190
Checks: C-6621r377672_chk
Review the web server documentation and deployment configuration to determine if the web server is configured to generate a date and time for each logged event. Request a user access the hosted application and generate logable events, and then review the logs to determine if the date and time are included in the log event data. If the date and time are not included, this is a finding.
Fix: F-6621r377673_fix
Configure the web server to log date and time with the event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-APP-000097-WSR-000058
- Vuln IDs
-
- V-206361
- V-41614
- Rule IDs
-
- SV-206361r960897_rule
- SV-54191
Checks: C-6622r377675_chk
Review the web server documentation and deployment configuration to determine if the web server is configured to generate sufficient information to resolve in which process within the web server the log event occurred. Request a user access the hosted application and generate logable events, and then review the logs to determine if the process of the event within the web server can be established. If it cannot be determined where the event occurred, this is a finding.
Fix: F-6622r377676_fix
Configure the web server to generate enough information to determine in what process within the web server the log event occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SRG-APP-000098-WSR-000059
- Vuln IDs
-
- V-206362
- V-41615
- Rule IDs
-
- SV-206362r960900_rule
- SV-54192
Checks: C-6623r377678_chk
Review the web server documentation and deployment configuration to determine if the web server is configured to generate sufficient information to resolve the source, e.g. source IP, of the log event. Request a user access the hosted application and generate logable events, and then review the logs to determine if the source of the event can be established. If the source of the event cannot be determined, this is a finding.
Fix: F-6623r377679_fix
Configure the web server to generate the source of each logable event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SRG-APP-000098-WSR-000060
- Vuln IDs
-
- V-206363
- V-41616
- Rule IDs
-
- SV-206363r960900_rule
- SV-54193
Checks: C-6624r377681_chk
Review the deployment configuration to determine if the web server is sitting behind a proxy server. If the web server is not sitting behind a proxy server, this finding is NA. If the web server is behind a proxy server, review the documentation and deployment configuration to determine if the web server is configured to generate sufficient information to resolve the source, e.g. source IP, of the logged event and not the proxy server. Request a user access the hosted application through the proxy server and generate logable events, and then review the logs to determine if the source of the event can be established. If the source of the event cannot be determined, this is a finding.
Fix: F-6624r377682_fix
Configure the web server to generate the client source, not the load balancer or proxy server, of each logable event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SRG-APP-000099-WSR-000061
- Vuln IDs
-
- V-206364
- V-41617
- Rule IDs
-
- SV-206364r960903_rule
- SV-54194
Checks: C-6625r377684_chk
Review the web server documentation and deployment configuration to determine if the web server is configured to generate the outcome (success or failure) of the event. Request a user access the hosted application and generate logable events, and then review the logs to determine if the outcome of the event can be established. If the outcome of the event cannot be determined, this is a finding.
Fix: F-6625r377685_fix
Configure the web server to generate the outcome, success or failure, as part of each logable event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- SRG-APP-000100-WSR-000064
- Vuln IDs
-
- V-206365
- V-41620
- Rule IDs
-
- SV-206365r960906_rule
- SV-54197
Checks: C-6626r377687_chk
Review the web server documentation and deployment configuration to determine if the web server can generate log data containing the user/subject identity. Request a user access the hosted application and generate logable events, and verify the events contain the user/subject or process identity. If the identity is not part of the log record, this is a finding.
Fix: F-6626r377688_fix
Configure the web server to include the user/subject identity or process as part of each log record.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000139
- Version
- SRG-APP-000108-WSR-000166
- Vuln IDs
-
- V-206366
- V-55973
- Rule IDs
-
- SV-206366r960912_rule
- SV-70227
Checks: C-6627r377690_chk
Review the web server documentation and deployment configuration settings to determine if the web server logging system provides an alert to the ISSO and the SA at a minimum when a processing failure occurs. If alerts are not sent or the web server is not configured to use a dedicated logging tool that meets this requirement, this is a finding.
Fix: F-6627r377691_fix
Configure the web server to provide an alert to the ISSO and SA when log processing failures occur. If the web server cannot generate alerts, utilize an external logging system that meets this criterion.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-000159
- Version
- SRG-APP-000116-WSR-000066
- Vuln IDs
-
- V-206367
- V-41668
- Rule IDs
-
- SV-206367r960927_rule
- SV-54245
Checks: C-6628r377693_chk
Review the web server documentation and deployment configuration to determine if the internal system clock is used for date and time stamps. If this is not feasible, an alternative workaround is to take an action that generates an entry in the log and then immediately query the operating system for the current time. A reasonable match between the two times will suffice as evidence that the system is using the internal clock for date and time stamps. If the web server does not use the internal system clock to generate time stamps, this is a finding.
Fix: F-6628r377694_fix
Configure the web server to use internal system clocks to generate date and time stamps for log records.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- SRG-APP-000118-WSR-000068
- Vuln IDs
-
- V-206368
- V-41670
- Rule IDs
-
- SV-206368r960930_rule
- SV-54247
Checks: C-6629r377696_chk
Review the web server documentation and deployed configuration settings to determine if the web server logging features protect log information from unauthorized access. Review file system settings to verify the log files have secure file permissions. If the web server log files are not protected from unauthorized access, this is a finding.
Fix: F-6629r377697_fix
Configure the web server log files so unauthorized access of log information is not possible.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- SRG-APP-000119-WSR-000069
- Vuln IDs
-
- V-206369
- V-41671
- Rule IDs
-
- SV-206369r960933_rule
- SV-54248
Checks: C-6630r377699_chk
Review the web server documentation and deployed configuration settings to determine if the web server logging features protect log information from unauthorized modification. Review file system settings to verify the log files have secure file permissions. If the web server log files are not protected from unauthorized modification, this is a finding.
Fix: F-6630r377700_fix
Configure the web server log files so unauthorized modification of log information is not possible.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- SRG-APP-000120-WSR-000070
- Vuln IDs
-
- V-206370
- V-41672
- Rule IDs
-
- SV-206370r960936_rule
- SV-54249
Checks: C-6631r377702_chk
Review the web server documentation and deployed configuration settings to determine if the web server logging features protect log information from unauthorized deletion. Review file system settings to verify the log files have secure file permissions. If the web server log files are not protected from unauthorized deletion, this is a finding.
Fix: F-6631r377703_fix
Configure the web server log files so unauthorized deletion of log information is not possible.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001348
- Version
- SRG-APP-000125-WSR-000071
- Vuln IDs
-
- V-206371
- V-41674
- Rule IDs
-
- SV-206371r960948_rule
- SV-54251
Checks: C-6632r377705_chk
Review the web server documentation and deployed configuration to determine if the web server log records are backed up onto an unrelated system or media than the system being logged. If the web server logs are not backed up onto a different system or media than the system being logged, this is a finding.
Fix: F-6632r377706_fix
Configure the web server logs to be backed up onto a different system or media other than the system being logged.
- RMF Control
- Severity
- M
- CCI
- CCI-003992
- Version
- SRG-APP-000131-WSR-000051
- Vuln IDs
-
- V-206372
- V-55983
- Rule IDs
-
- SV-206372r984351_rule
- SV-70237
Checks: C-6633r377708_chk
Review the web server documentation and deployment configuration to determine if the web server validates files before the files are implemented into the running configuration. If the web server does not meet this requirement and an external facility is not available for use, this is a finding.
Fix: F-6633r377709_fix
Configure the web server to verify object integrity before becoming part of the production web server or utilize an external tool designed to meet this requirement.
- RMF Control
- Severity
- M
- CCI
- CCI-003992
- Version
- SRG-APP-000131-WSR-000073
- Vuln IDs
-
- V-206373
- V-41684
- Rule IDs
-
- SV-206373r984352_rule
- SV-54261
Checks: C-6634r377711_chk
Review the web server documentation and configuration to determine if web server modules are fully tested before implementation in the production environment. Review the web server for modules identified as test, debug, or backup and that cannot be reached through the hosted application. Review the web server to see if the web server or an external utility is in use to enforce the signing of modules before they are put into a production environment. If development and testing is taking place on the production web server or modules are put into production without being signed, this is a finding.
Fix: F-6634r377712_fix
Configure the web server to enforce, internally or through an external utility, the review, testing and signing of modules before implementation into the production environment.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000015
- Vuln IDs
-
- V-206374
- V-55989
- Rule IDs
-
- SV-206374r960963_rule
- SV-70243
Checks: C-6635r377714_chk
Review the web server documentation and configuration to determine if the web server is being used as a user management application. If the web server is being used to perform user management for the hosted applications, this is a finding.
Fix: F-6635r377715_fix
Configure the web server to disable user management functionality.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000075
- Vuln IDs
-
- V-206375
- V-41693
- Rule IDs
-
- SV-206375r960963_rule
- SV-54270
Checks: C-6636r377717_chk
Review the web server documentation and deployed configuration to determine if web server features, services, and processes are installed that are not needed for hosted application deployment. If excessive features, services, and processes are installed, this is a finding.
Fix: F-6636r377718_fix
Uninstall or deactivate features, services, and processes not needed by the web server for operation.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000076
- Vuln IDs
-
- V-206376
- V-41694
- Rule IDs
-
- SV-206376r960963_rule
- SV-54271
Checks: C-6637r377720_chk
Review the web server documentation and deployed configuration to determine if the web server is also a proxy server. If the web server is also acting as a proxy server, this is a finding.
Fix: F-6637r377721_fix
Uninstall any proxy services, modules, and libraries that are used by the web server to act as a proxy server. Verify all configuration changes are made to assure the web server is no longer acting as a proxy server in any manner.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000077
- Vuln IDs
-
- V-206377
- V-41695
- Rule IDs
-
- SV-206377r960963_rule
- SV-54272
Checks: C-6638r377723_chk
Review the web server documentation and deployment configuration to determine if the web server contains documentation, sample code, example applications, or tutorials. Verify the web server install process also offers an option to exclude these elements from installation and provides an uninstall option for their removal. If web server documentation, sample code, example applications, or tutorials are installed or the web server install process does not offer an option to exclude these elements from installation, this is a finding.
Fix: F-6638r377724_fix
Use the web server uninstall facility or manually remove any documentation, sample code, example applications, and tutorials.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000078
- Vuln IDs
-
- V-206378
- V-41696
- Rule IDs
-
- SV-206378r960963_rule
- SV-54273
Checks: C-6639r377726_chk
Review the web server documentation to determine the user accounts created when particular features are installed. Verify the deployed configuration to determine which features are installed with the web server. If any accounts exist that are not used by the installed features, this is a finding.
Fix: F-6639r377727_fix
Use the web server uninstall facility or manually remove the user accounts not used by the installed web server features.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000080
- Vuln IDs
-
- V-206379
- V-41698
- Rule IDs
-
- SV-206379r960963_rule
- SV-54275
Checks: C-6640r377729_chk
Review the web server documentation and deployment configuration to determine which web server utilities, services, and modules are installed. Verify these options are essential to the operation of the web server. Also, confirm the web server install process offers an option to exclude these utilities, services, and modules from installation that are not needed for operation and that there is an uninstall option for their removal. If there are more utilities, services, or modules installed than are needed for the operation of the web server or the web server does not provide an install facility to customize installation, this is a finding.
Fix: F-6640r377730_fix
Use the web server uninstall facility or manually remove any utility programs, services, or modules not needed by the web server for operation.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000081
- Vuln IDs
-
- V-206380
- V-41699
- Rule IDs
-
- SV-206380r960963_rule
- SV-54276
Checks: C-6641r377732_chk
Review the web server documentation and deployment configuration to determine if the OS shell is accessible by any MIME types that are enabled. If a user of the web server can invoke OS shell programs, this is a finding.
Fix: F-6641r377733_fix
Configure the web server to disable all MIME types that invoke OS shell programs.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000082
- Vuln IDs
-
- V-206381
- V-41700
- Rule IDs
-
- SV-206381r960963_rule
- SV-54277
Checks: C-6642r377735_chk
Review the web server documentation and deployment configuration to determine what script mappings are available. Review the scripts used by the web server and the hosted applications. If there are script mappings in use that are not used by the web server or hosted applications for operation, this is a finding.
Fix: F-6642r377736_fix
Remove script mappings that are not needed for web server and hosted application operation.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000083
- Vuln IDs
-
- V-206382
- V-41701
- Rule IDs
-
- SV-206382r960963_rule
- SV-54278
Checks: C-6643r377738_chk
Review the web server documentation and deployment configuration to determine what types of files are being used for the hosted applications. If the web server is configured to allow other file types not associated with the hosted application, especially those associated with logs, configuration files, passwords, etc., this is a finding.
Fix: F-6643r377739_fix
Configure the web server to only serve file types to the user that are needed by the hosted applications. All other file types must be disabled.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000085
- Vuln IDs
-
- V-206383
- V-41702
- Rule IDs
-
- SV-206383r960963_rule
- SV-54279
Checks: C-6644r377741_chk
Review the web server documentation and deployment configuration to determine if Web Distributed Authoring (WebDAV) is enabled. If WebDAV is enabled, this is a finding.
Fix: F-6644r377742_fix
Configure the web server to disable Web Distributed Authoring.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000086
- Vuln IDs
-
- V-206384
- V-41703
- Rule IDs
-
- SV-206384r960963_rule
- SV-54280
Checks: C-6645r377744_chk
Review the web server documentation and configuration to determine the access to server resources given to hosted applications. If hosted applications have access to more system resources than needed for operation, this is a finding.
Fix: F-6645r377745_fix
Configure the privileges given to hosted applications to the minimum required for application operation.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-WSR-000087
- Vuln IDs
-
- V-206385
- V-41704
- Rule IDs
-
- SV-206385r960963_rule
- SV-54281
Checks: C-6646r377747_chk
Review the web server documentation and configuration to determine where the document root or home directory for each application hosted by the web server is located. Verify that users of the web server applications, and any scripts running on the user's behalf, are contained to each application's domain. If users of the web server applications, and any scripts running on the user's behalf, are not contained, this is a finding.
Fix: F-6646r377748_fix
Configure the web server to contain users and scripts to each hosted application's domain.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- SRG-APP-000142-WSR-000089
- Vuln IDs
-
- V-206386
- V-41706
- Rule IDs
-
- SV-206386r960966_rule
- SV-54283
Checks: C-6647r377750_chk
Review the web server documentation and deployment configuration to determine whether the web server is configured to listen on a specified IP address and port. Request a client user try to access the web server on any other available IP addresses on the hosting hardware. If an IP address is not configured on the web server or a client can reach the web server on other IP addresses assigned to the hosting hardware, this is a finding.
Fix: F-6647r377751_fix
Configure the web server to only listen on a specified IP address and port.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- SRG-APP-000172-WSR-000104
- Vuln IDs
-
- V-206387
- V-41738
- Rule IDs
-
- SV-206387r961029_rule
- SV-54315
Checks: C-6648r377753_chk
Review the web server documentation and deployed configuration to determine whether passwords are being passed to or from the web server. If the transmission of passwords is not encrypted, this is a finding.
Fix: F-6648r377754_fix
Configure the web server to encrypt the transmission passwords.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- SRG-APP-000175-WSR-000095
- Vuln IDs
-
- V-206388
- V-41730
- Rule IDs
-
- SV-206388r961038_rule
- SV-54307
Checks: C-6649r377756_chk
Review the web server documentation and deployed configuration to determine whether the web server provides PKI functionality that validates certification paths in accordance with RFC 5280. If PKI is not being used, this is NA. If the web server is using PKI, but it does not perform this requirement, this is a finding.
Fix: F-6649r377757_fix
Configure the web server to validate certificates in accordance with RFC 5280.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- SRG-APP-000176-WSR-000096
- Vuln IDs
-
- V-206389
- V-41731
- Rule IDs
-
- SV-206389r961041_rule
- SV-54308
Checks: C-6650r377759_chk
If the web server does not have a private key, this is N/A. Review the web server documentation and deployed configuration to determine whether only authenticated system administrators and the designated PKI Sponsor for the web server can access the web server private key. If the private key is accessible by unauthenticated or unauthorized users, this is a finding.
Fix: F-6650r377760_fix
Configure the web server to ensure only authenticated and authorized users can access the web server's private key.
- RMF Control
- IA-7
- Severity
- H
- CCI
- CCI-000803
- Version
- SRG-APP-000179-WSR-000110
- Vuln IDs
-
- V-206390
- V-41745
- Rule IDs
-
- SV-206390r961050_rule
- SV-54322
Checks: C-6651r377762_chk
Review web server documentation and deployed configuration to determine whether the encryption modules utilized for storage of data are FIPS 140-2 compliant. Reference the following NIST site to identify validated encryption modules: http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm If the encryption modules used for storage of data are not FIPS 140-2 validated, this is a finding.
Fix: F-6651r377763_fix
Configure the web server to utilize FIPS 140-2 approved encryption modules when the web server is storing data.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- SRG-APP-000179-WSR-000111
- Vuln IDs
-
- V-206391
- V-41746
- Rule IDs
-
- SV-206391r961050_rule
- SV-54323
Checks: C-6652r377765_chk
Review web server documentation and deployed configuration to determine whether the encryption modules utilized for authentication are FIPS 140-2 compliant. Reference the following NIST site to identify validated encryption modules: http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm If the encryption modules used for authentication are not FIPS 140-2 validated, this is a finding.
Fix: F-6652r377766_fix
Configure the web server to utilize FIPS 140-2 approved encryption modules when authenticating users and processes.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- SRG-APP-000206-WSR-000128
- Vuln IDs
-
- V-206392
- V-56019
- Rule IDs
-
- SV-206392r961083_rule
- SV-70273
Checks: C-6653r377768_chk
Review the web server documentation and deployed configuration to determine whether mobile code used by hosted applications follows the DoD policies on the acquisition, development, and/or use of mobile code. If the web server is not configured to follow the DoD policies on mobile code, this is a finding.
Fix: F-6653r377769_fix
Configure the web server to follow the DoD policies on mobile code.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- SRG-APP-000211-WSR-000030
- Vuln IDs
-
- V-206393
- V-55995
- Rule IDs
-
- SV-206393r961095_rule
- SV-70249
Checks: C-6654r377771_chk
Review the web server documentation and configuration to determine what web server accounts are available on the hosting server. If non-privileged web server accounts are available with access to functions, directories, or files not needed for the role of the account, this is a finding.
Fix: F-6654r377772_fix
Limit the functions, directories, and files that are accessible by each account and role to administrative accounts and remove or modify non-privileged account access.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- SRG-APP-000211-WSR-000031
- Vuln IDs
-
- V-206394
- V-55993
- Rule IDs
-
- SV-206394r961095_rule
- SV-70247
Checks: C-6655r377774_chk
Review the web server documentation and configuration to determine if anonymous users can make changes to the web server or any applications hosted by the web server. If anonymous users can make changes, this is a finding.
Fix: F-6655r377775_fix
Configure the web server to not allow anonymous users to change the web server or any hosted applications.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- SRG-APP-000211-WSR-000129
- Vuln IDs
-
- V-206395
- V-41794
- Rule IDs
-
- SV-206395r961095_rule
- SV-54371
Checks: C-6656r377777_chk
Review the web server documentation and deployed configuration to determine whether hosted application functionality is separated from web server management functions. If the functions are not separated, this is a finding.
Fix: F-6656r377778_fix
Configure the web server to separate the hosted applications from web server management functionality.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001185
- Version
- SRG-APP-000220-WSR-000201
- Vuln IDs
-
- V-206396
- V-56021
- Rule IDs
-
- SV-206396r961113_rule
- SV-70275
Checks: C-6657r377780_chk
Review the web server documentation and deployed configuration to verify that the web server is configured to invalidate session identifiers when a session is terminated. If the web server does not invalidate session identifiers when a session is terminated, this is a finding.
Fix: F-6657r377781_fix
Configure the web server to invalidate session identifiers when a session is terminated.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001664
- Version
- SRG-APP-000223-WSR-000011
- Vuln IDs
-
- V-206397
- V-56025
- Rule IDs
-
- SV-206397r961116_rule
- SV-70279
Checks: C-6658r377783_chk
Review the web server documentation and configuration to determine if cookies between the web server and client are accessible by applications or web servers other than the originating pair. If the cookie information is accessible outside the originating pair, this is a finding.
Fix: F-6658r377784_fix
Configure the web server to set properties within cookies to disallow the cookie to be accessed by other web servers and applications.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001664
- Version
- SRG-APP-000223-WSR-000145
- Vuln IDs
-
- V-206398
- V-41818
- Rule IDs
-
- SV-206398r961116_rule
- SV-54395
Checks: C-6659r377786_chk
Review the web server documentation and deployed configuration to determine whether the web server accepts session IDs that are not system-generated. If the web server does accept non-system-generated session IDs, this is a finding.
Fix: F-6659r377787_fix
Configure the web server to only accept session IDs that are created by the web server.
- RMF Control
- SC-23
- Severity
- H
- CCI
- CCI-001188
- Version
- SRG-APP-000224-WSR-000135
- Vuln IDs
-
- V-206399
- V-56023
- Rule IDs
-
- SV-206399r961119_rule
- SV-70277
Checks: C-6660r377789_chk
Review the web server documentation and deployed configuration to verify that the web server is configured to generate unique session identifiers with a FIPS 140-2 approved random number generator. Request two users access the web server and view the session identifier generated for each user to verify that the session IDs are not sequential. If the web server is not configured to generate unique session identifiers or the random number generator is not FIPS 140-2 approved, this is a finding.
Fix: F-6660r377790_fix
Configure the web server to generate unique session identifiers using a FIPS 140-2 random number generator.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001188
- Version
- SRG-APP-000224-WSR-000136
- Vuln IDs
-
- V-206400
- V-41807
- Rule IDs
-
- SV-206400r961119_rule
- SV-54384
Checks: C-6661r377792_chk
Review the web server documentation and deployed configuration to verify that random and unique session identifiers are generated. Access the web server ID generator function and generate two IDs using the same input. If the web server is not configured to generate random and unique session identifiers, or the ID generator generates the same ID for the same input, this is a finding.
Fix: F-6661r377793_fix
Configure the web server to generate random and unique session identifiers that cannot be reliably reproduced.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001188
- Version
- SRG-APP-000224-WSR-000137
- Vuln IDs
-
- V-206401
- V-41808
- Rule IDs
-
- SV-206401r961119_rule
- SV-54385
Checks: C-6662r377795_chk
Review the web server documentation and deployed configuration to see how long the generated session identifiers are. If the web server is not configured to generate session identifiers that are at least 128 bits (16 bytes) in length, this is a finding.
Fix: F-6662r377796_fix
Configure the web server to generate session identifiers that are at least 128 bits in length.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001188
- Version
- SRG-APP-000224-WSR-000138
- Vuln IDs
-
- V-206402
- V-41809
- Rule IDs
-
- SV-206402r961119_rule
- SV-54386
Checks: C-6663r377798_chk
Review the web server documentation and deployed configuration to determine what characters are used in generating session IDs. If the web server is not configured to use at least A-Z, a-z, and 0-9 to generate session identifiers, this is a finding.
Fix: F-6663r377799_fix
Configure the web server to use at least A-Z, a-z, and 0-9 to generate session IDs.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001188
- Version
- SRG-APP-000224-WSR-000139
- Vuln IDs
-
- V-206403
- V-41810
- Rule IDs
-
- SV-206403r961119_rule
- SV-54387
Checks: C-6664r377801_chk
Review the web server documentation and deployed configuration to verify that the web server is generating random session IDs with entropy equal to at least half the session ID length. If the web server is not configured to generate random session IDs with the proper amount of entropy, this is a finding.
Fix: F-6664r377802_fix
Configure the web server to generate random session IDs with minimum entropy equal to half the session ID length.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-APP-000225-WSR-000074
- Vuln IDs
-
- V-206404
- V-56029
- Rule IDs
-
- SV-206404r961122_rule
- SV-70283
Checks: C-6665r377804_chk
Review the web server documentation and deployed configuration to determine if the web server offers the capability to reinstall from a known state. If the web server does not offer this capability, determine if the web server, in any manner, prohibits the reinstallation of a known state. If the web server does prohibit the reinstallation to a known state, this is a finding.
Fix: F-6665r377805_fix
Configure the web server to augment and not hinder the reinstallation of a known and stable baseline.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-APP-000225-WSR-000140
- Vuln IDs
-
- V-206405
- V-41811
- Rule IDs
-
- SV-206405r961122_rule
- SV-54388
Checks: C-6666r377807_chk
Review the web server documentation, deployed configuration, and risk analysis documentation to determine whether the web server will fail to known states for system initialization, shutdown, or abort failures. If the web server will not fail to known state, this is a finding.
Fix: F-6666r377808_fix
Configure the web server to fail to the states of operation during system initialization, shutdown, or abort failures found in the risk analysis.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-APP-000225-WSR-000141
- Vuln IDs
-
- V-206406
- V-41812
- Rule IDs
-
- SV-206406r961122_rule
- SV-54389
Checks: C-6667r377810_chk
Review the web server documentation, deployed configuration, and risk analysis documentation to verify that the web server is configured to provide clustering functionality, if the web server is a high-availability web server. If the web server is not a high-availability web server, this finding is NA. If the web server is not configured to provide clustering or some form of failover functionality and the web server is a high-availability server, this is a finding.
Fix: F-6667r377811_fix
Configure the web server to provide application failover, or participate in a web cluster that provides failover for high-availability web servers.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- SRG-APP-000231-WSR-000144
- Vuln IDs
-
- V-206407
- V-41815
- Rule IDs
-
- SV-206407r961128_rule
- SV-54392
Checks: C-6668r377813_chk
Review the web server documentation and deployed configuration to locate where potential data at rest is stored. Verify that the data is encrypted using a DoD-accepted algorithm to protect the confidentiality and integrity of the information. If the data is not encrypted using a DoD-accepted algorithm, this is a finding.
Fix: F-6668r377814_fix
Use a DoD-accepted algorithm to encrypt data at rest to protect the information's confidentiality and integrity.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- SRG-APP-000233-WSR-000146
- Vuln IDs
-
- V-206408
- V-41821
- Rule IDs
-
- SV-206408r961131_rule
- SV-54398
Checks: C-6669r377816_chk
Review the web server documentation and deployed configuration to determine where the document directory is located for each hosted application. If the document directory is not in a separate partition from the web server's system files, this is a finding.
Fix: F-6669r377817_fix
Configure the web server to place the document directories in a separate partition from the web server system files.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- SRG-APP-000246-WSR-000149
- Vuln IDs
-
- V-206409
- V-41833
- Rule IDs
-
- SV-206409r961152_rule
- SV-54410
Checks: C-6670r377819_chk
Review the web server documentation and deployed configuration to determine whether the web server has been configured to limit the ability of the web server to be used in a DoS attack. If not, this is a finding.
Fix: F-6670r377820_fix
Configure the web server to limit the ability of users to use the web server in a DoS attack.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- SRG-APP-000251-WSR-000157
- Vuln IDs
-
- V-206410
- V-41852
- Rule IDs
-
- SV-206410r961158_rule
- SV-54429
Checks: C-6671r377822_chk
Review the web server documentation and deployed configuration to determine what the data set is for data entry. If the web server does not limit the data set used for data entry, this is a finding.
Fix: F-6671r377823_fix
Configure the web server to only accept the character sets expected by the hosted applications.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- SRG-APP-000266-WSR-000142
- Vuln IDs
-
- V-206411
- V-56035
- Rule IDs
-
- SV-206411r961167_rule
- SV-70289
Checks: C-6672r377825_chk
Review the web server documentation and deployed configuration to locate all the web document directories. Verify that each web document directory contains a default hosted application web page that can be used by the web server in the event a web page cannot be found. If a document directory does not contain a default web page, this is a finding.
Fix: F-6672r377826_fix
Place a default web page in every web document directory.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- SRG-APP-000266-WSR-000159
- Vuln IDs
-
- V-206412
- V-41854
- Rule IDs
-
- SV-206412r961167_rule
- SV-54431
Checks: C-6673r377828_chk
Review the web server documentation and deployed configuration to determine whether the web server offers different modes of operation that will minimize the identity of the web server, patches, loaded modules, and directory paths given to clients on error conditions. If the web server is not configured to minimize the information given to clients, this is a finding.
Fix: F-6673r377829_fix
Configure the web server to minimize the information provided to the client in warning and error messages.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- SRG-APP-000266-WSR-000160
- Vuln IDs
-
- V-206413
- V-41855
- Rule IDs
-
- SV-206413r961167_rule
- SV-54432
Checks: C-6674r377831_chk
Review the web server documentation and deployed configuration to determine if debugging and trace information are enabled. If the web server is configured with debugging and trace information enabled, this is a finding.
Fix: F-6674r377832_fix
Configure the web server to minimize the information given to clients on error conditions by disabling debugging and trace information.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- SRG-APP-000295-WSR-000012
- Vuln IDs
-
- V-206414
- V-55951
- Rule IDs
-
- SV-206414r962268_rule
- SV-70205
Checks: C-6675r962266_chk
Verify that the web server is configured to close sessions after eight hours or less. If the web server is not configured to close sessions after eight hours or less, this is a finding.
Fix: F-6675r962267_fix
Configure the web server to close sessions after eight hours or less.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- SRG-APP-000295-WSR-000134
- Vuln IDs
-
- V-206415
- V-55949
- Rule IDs
-
- SV-206415r961221_rule
- SV-70203
Checks: C-6676r377837_chk
Review the hosted applications, web server documentation and deployed configuration to verify that the web server will close an open session after a configurable time of inactivity. If the web server does not close sessions after a configurable time of inactivity or the amount of time is configured higher than 5 minutes for high-risk applications, 10 minutes for medium-risk applications, or 20 minutes for low-risk applications, this is a finding.
Fix: F-6676r377838_fix
Configure the web server to close inactive sessions after 5 minutes for high-risk applications, 10 minutes for medium-risk applications, or 20 minutes for low-risk applications.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- SRG-APP-000315-WSR-000003
- Vuln IDs
-
- V-206416
- V-55953
- Rule IDs
-
- SV-206416r961278_rule
- SV-70207
Checks: C-6677r377840_chk
Review the web server product documentation and deployed configuration to determine if the server or an enterprise tool is enforcing the organization's requirements for remote connections. If the web server is not configured to enforce these requirements and an enterprise tool is not in place, this is a finding.
Fix: F-6677r377841_fix
Configure the web server to enforce the remote access policy or to work with an enterprise tool designed to enforce the policy.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- SRG-APP-000315-WSR-000004
- Vuln IDs
-
- V-206417
- V-55961
- Rule IDs
-
- SV-206417r961278_rule
- SV-70215
Checks: C-6678r377843_chk
Review the web server configuration to verify that the web server is restricting access from nonsecure zones. If the web server is not configured to restrict access from nonsecure zones, then this is a finding.
Fix: F-6678r377844_fix
Configure the web server to block access from DoD-defined nonsecure zones.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002322
- Version
- SRG-APP-000316-WSR-000170
- Vuln IDs
-
- V-206418
- V-55955
- Rule IDs
-
- SV-206418r961281_rule
- SV-70209
Checks: C-6679r377846_chk
Review the web server documentation and configuration to make certain that the web server is configured to allow for the immediate disconnection or disabling of remote access to hosted applications when necessary. If the web server is not capable of or cannot be configured to disconnect or disable remote access to the hosted applications when necessary, this is a finding.
Fix: F-6679r377847_fix
Configure the web server to provide the capability to immediately disconnect or disable remote access to the hosted applications.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- SRG-APP-000340-WSR-000029
- Vuln IDs
-
- V-206419
- V-55947
- Rule IDs
-
- SV-206419r961353_rule
- SV-70201
Checks: C-6680r377849_chk
Review the web server documentation and configuration to determine if accounts used for administrative duties of the web server are separated from non-privileged accounts. If non-privileged accounts can access web server security-relevant information, this is a finding.
Fix: F-6680r377850_fix
Set up accounts and roles that can be used to perform web server security-relevant tasks and remove or modify non-privileged account access to security-relevant tasks.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- SRG-APP-000357-WSR-000150
- Vuln IDs
-
- V-206421
- V-55959
- Rule IDs
-
- SV-206421r961392_rule
- SV-70213
Checks: C-6682r377855_chk
Review the web server documentation and deployment configuration to determine if the web server is using a logging mechanism to store log records. If a logging mechanism is in use, validate that the mechanism is configured to use record storage capacity in accordance with specifications within NIST SP 800-92 for log record storage requirements. If the web server is not using a logging mechanism, or if the mechanism has not been configured to allocate log record storage capacity in accordance with NIST SP 800-92, this is a finding.
Fix: F-6682r377856_fix
Configure the web server to use a logging mechanism that is configured to allocate log record storage capacity in accordance with NIST SP 800-92 log record storage requirements.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-APP-000358-WSR-000063
- Vuln IDs
-
- V-206422
- V-55969
- Rule IDs
-
- SV-206422r961395_rule
- SV-70223
Checks: C-6683r377858_chk
Review the web server documentation and deployment configuration to determine if the web server can write log data to, or if log data can be transferred to, a separate audit server. Request a user access the hosted application and generate logable events and verify the data is written to a separate audit server. If logs cannot be directly written or transferred on request or on a periodic schedule to an audit log server, this is a finding.
Fix: F-6683r377859_fix
Configure the web server to directly write or transfer the logs to a remote audit log server.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-APP-000358-WSR-000163
- Vuln IDs
-
- V-206423
- V-55971
- Rule IDs
-
- SV-206423r961395_rule
- SV-70225
Checks: C-6684r377861_chk
Review the web server documentation and deployed configuration to determine whether the web server is logging security-relevant events. Determine whether there is a security tool in place that allows review and alert capabilities and whether the web server is sending events to this system. If the web server is not, this is a finding.
Fix: F-6684r377862_fix
Configure the web server to send logged events to the organization's security infrastructure tool that offers review and alert capabilities.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- SRG-APP-000359-WSR-000065
- Vuln IDs
-
- V-206424
- V-55975
- Rule IDs
-
- SV-206424r961398_rule
- SV-70229
Checks: C-6685r377864_chk
Review the web server documentation and deployment configuration settings to determine if the web server log system provides a warning to the ISSO and SA when allocated record storage volume reaches 75% of maximum record storage capacity. If designated alerts are not sent or the web server is not configured to use a dedicated log tool that meets this requirement, this is a finding.
Fix: F-6685r377865_fix
Configure the web server to provide a warning to the ISSO and SA when allocated log record storage volume reaches 75% of maximum record storage capacity.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001890
- Version
- SRG-APP-000374-WSR-000172
- Vuln IDs
-
- V-206425
- V-55979
- Rule IDs
-
- SV-206425r961443_rule
- SV-70233
Checks: C-6686r377867_chk
Review the web server documentation and configuration to determine the time stamp format for log data. If the time stamp is not mapped to UTC or GMT time, this is a finding.
Fix: F-6686r377868_fix
Configure the web server to store log data time stamps in a format that is mapped to UTC or GMT time.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001889
- Version
- SRG-APP-000375-WSR-000171
- Vuln IDs
-
- V-206426
- V-55977
- Rule IDs
-
- SV-206426r961446_rule
- SV-70231
Checks: C-6687r377870_chk
Review the web server documentation and configuration to determine if log records are time stamped to a minimum granularity of one second. Have a user generate a logable event and review the log data to determine if the web server is configured correctly. If the log data does not contain a time stamp to a minimum granularity of one second, this is a finding.
Fix: F-6687r377871_fix
Configure the web server to record log events with a time stamp to a granularity of one second.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- SRG-APP-000380-WSR-000072
- Vuln IDs
-
- V-206427
- V-55981
- Rule IDs
-
- SV-206427r961461_rule
- SV-70235
Checks: C-6688r377873_chk
Review the web server documentation and configuration to determine if the web server provides unique account roles specifically for the purposes of segmenting the responsibilities for managing the web server. Log into the hosting server using a web server role with limited permissions (e.g., Auditor, Developer, etc.) and verify the account is not able to perform configuration changes that are not related to that role. If roles are not defined with limited permissions and restrictions, this is a finding.
Fix: F-6688r377874_fix
Define roles and responsibilities to be used when managing the web server. Configure the hosting system to utilize specific roles that restrict access related to web server system and configuration changes.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- SRG-APP-000383-WSR-000175
- Vuln IDs
-
- V-206428
- V-55991
- Rule IDs
-
- SV-206428r961470_rule
- SV-70245
Checks: C-6689r377876_chk
Review the web server documentation and deployment configuration to determine which ports and protocols are enabled. Verify that the ports and protocols being used are permitted, necessary for the operation of the web server and the hosted applications and are secure for a production system. If any of the ports or protocols are not permitted, are nonsecure or are not necessary for web server operation, this is a finding.
Fix: F-6689r377877_fix
Configure the web server to disable any ports or protocols that are not permitted, are nonsecure for a production web server or are not necessary for web server operation.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-002470
- Version
- SRG-APP-000427-WSR-000186
- Vuln IDs
-
- V-206430
- V-56027
- Rule IDs
-
- SV-206430r965407_rule
- SV-70281
Checks: C-6691r965406_chk
If the web server does not provide PKI-based user authentication intermediary services, this is not applicable. Verify the web server only allows the use of DOD PKI-established CA for verification when establishing sessions. Verify both user and machine certificates are being validated when establishing sessions. If the web server does not validate user and machine certificates using DOD PKI-established CAs, this is a finding.
Fix: F-6691r962270_fix
Configure the web server to only allow the use of DOD PKI-established CAs for the session establishment. Configure validation for both the user and machine certificates.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002476
- Version
- SRG-APP-000429-WSR-000113
- Vuln IDs
-
- V-206431
- V-56031
- Rule IDs
-
- SV-206431r961602_rule
- SV-70285
Checks: C-6692r377885_chk
Review the web server documentation and deployed configuration to determine whether the web server is authorizing and managing users. If the web server is not authorizing and managing users, this is NA. If the web server is the user authenticator and manager, verify that stored user identifiers and passwords are being encrypted by the web server. If the user information is not being encrypted when stored, this is a finding.
Fix: F-6692r377886_fix
Configure the web server to encrypt the user identifiers and passwords when storing them on digital media.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-APP-000435-WSR-000147
- Vuln IDs
-
- V-206432
- V-55999
- Rule IDs
-
- SV-206432r961620_rule
- SV-70253
Checks: C-6693r377888_chk
Review the web server documentation and deployed configuration to determine where the process ID is stored and which utilities are used to start/stop the web server. Determine whether the process ID and the utilities are protected from non-privileged users. If they are not protected, this is a finding.
Fix: F-6693r377889_fix
Remove or modify non-privileged account access to the web server process ID and the utilities used for starting/stopping the web server.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- SRG-APP-000435-WSR-000148
- Vuln IDs
-
- V-206433
- V-55997
- Rule IDs
-
- SV-206433r961620_rule
- SV-70251
Checks: C-6694r377891_chk
Review the web server documentation and deployed configuration to determine what parameters are set to tune the web server. Review the hosted applications along with risk analysis documents to determine the expected user traffic. If the web server has not been tuned to avoid a DoS, this is a finding.
Fix: F-6694r377892_fix
Analyze the expected user traffic for the hosted applications. Tune the web server to avoid a DoS condition under normal user traffic to the hosted applications.
- RMF Control
- SC-8
- Severity
- H
- CCI
- CCI-002418
- Version
- SRG-APP-000439-WSR-000151
- Vuln IDs
-
- V-206434
- V-56001
- Rule IDs
-
- SV-206434r961632_rule
- SV-70255
Checks: C-6695r377894_chk
Review the web server documentation and deployed configuration to determine whether the transmission of data between the web server and external devices is encrypted. If the web server does not encrypt the transmission, this is a finding.
Fix: F-6695r377895_fix
Configure the web server to encrypt the transmission of data between the web server and external devices.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-APP-000439-WSR-000152
- Vuln IDs
-
- V-206435
- V-56003
- Rule IDs
-
- SV-206435r961632_rule
- SV-70257
Checks: C-6696r377897_chk
Review the web server documentation and deployed configuration to determine whether the session identifier is being sent to the client encrypted. If the web server does not encrypt the session identifier, this is a finding.
Fix: F-6696r377898_fix
Configure the web server to encrypt the session identifier for transmission to the client.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-APP-000439-WSR-000153
- Vuln IDs
-
- V-206436
- V-56005
- Rule IDs
-
- SV-206436r961632_rule
- SV-70259
Checks: C-6697r377900_chk
Review the web server documentation and deployed configuration to determine whether cookies are being sent to the client using SSL/TLS. If the transmission is through a SSL/TLS connection, but the cookie is not being compressed, this finding is NA. If the web server is using SSL/TLS for cookie transmission and the cookie is also being compressed, this is a finding.
Fix: F-6697r377901_fix
Configure the web server to send the cookie to the client via SSL/TLS without using cookie compression.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-APP-000439-WSR-000154
- Vuln IDs
-
- V-206437
- V-56007
- Rule IDs
-
- SV-206437r961632_rule
- SV-70261
Checks: C-6698r377903_chk
Review the web server documentation and deployed configuration to determine how to disable client-side scripts from reading cookies. If the web server is not configured to disallow client-side scripts from reading cookies, this is a finding.
Fix: F-6698r377904_fix
Configure the web server to disallow client-side scripts the capability of reading cookie information.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-APP-000439-WSR-000155
- Vuln IDs
-
- V-206438
- V-56009
- Rule IDs
-
- SV-206438r961632_rule
- SV-70263
Checks: C-6699r377906_chk
Review the web server documentation and deployed configuration to verify that cookies are encrypted before transmission. If the web server is not configured to encrypt cookies, this is a finding.
Fix: F-6699r377907_fix
Configure the web server to encrypt cookies before transmission.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-APP-000439-WSR-000156
- Vuln IDs
-
- V-206439
- V-56011
- Rule IDs
-
- SV-206439r961632_rule
- SV-70265
Checks: C-6700r377909_chk
Review the web server documentation and deployed configuration to determine which version of TLS is being used. If the TLS version is not an approved version according to NIST SP 800-52 or non-FIPS-approved algorithms are enabled, this is a finding.
Fix: F-6700r377910_fix
Configure the web server to use an approved TLS version according to NIST SP 800-52 and to disable all non-approved versions.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-APP-000439-WSR-000188
- Vuln IDs
-
- V-206440
- V-61353
- Rule IDs
-
- SV-206440r961632_rule
- SV-75835
Checks: C-6701r377912_chk
Review the web server documentation and deployed configuration to determine if export ciphers are removed. If the web server does not have the export ciphers removed, this is a finding.
Fix: F-6701r377913_fix
Configure the web server to have export ciphers removed.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002420
- Version
- SRG-APP-000441-WSR-000181
- Vuln IDs
-
- V-206441
- V-56013
- Rule IDs
-
- SV-206441r961638_rule
- SV-70267
Checks: C-6702r377915_chk
Review the web server documentation and deployed configuration to determine if the web server maintains the confidentiality and integrity of information during preparation before transmission. If the confidentiality and integrity are not maintained, this is a finding.
Fix: F-6702r377916_fix
Configure the web server to maintain the confidentiality and integrity of information during preparation for transmission.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002422
- Version
- SRG-APP-000442-WSR-000182
- Vuln IDs
-
- V-206442
- V-56015
- Rule IDs
-
- SV-206442r961641_rule
- SV-70269
Checks: C-6703r377918_chk
Review web server configuration to determine if the server is using a transmission method that maintains the confidentiality and integrity of information during reception. If a transmission method is not being used that maintains the confidentiality and integrity of the data during reception, this is a finding.
Fix: F-6703r377919_fix
Configure the web server to utilize a transmission method that maintains the confidentiality and integrity of information during reception.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- SRG-APP-000456-WSR-000187
- Vuln IDs
-
- V-206443
- V-56033
- Rule IDs
-
- SV-206443r961683_rule
- SV-70287
Checks: C-6704r377921_chk
Review the web server documentation and configuration to determine if the web server checks for patches from an authoritative source at least every 30 days. If there is no timeframe or the timeframe is greater than 30 days, this is a finding.
Fix: F-6704r377922_fix
Configure the web server to check for patches and updates from an authoritative source at least every 30 days.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-WSR-000079
- Vuln IDs
-
- V-206444
- V-55987
- Rule IDs
-
- SV-206444r961863_rule
- SV-70241
Checks: C-6705r377924_chk
Review the web server documentation and deployment configuration to determine what non-service/system accounts were installed by the web server installation process. Verify the passwords for these accounts have been set and/or changed from the default passwords. If these accounts still have no password or default passwords, this is a finding.
Fix: F-6705r377925_fix
Set passwords for non-service/system accounts containing no passwords and change the passwords for accounts which still have default passwords.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-WSR-000174
- Vuln IDs
-
- V-206445
- V-55985
- Rule IDs
-
- SV-206445r961863_rule
- SV-70239
Checks: C-6706r377927_chk
Review the web server documentation and deployed configuration to determine if web server is configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance. If the web server is not configured according to the guidance, this is a finding.
Fix: F-6706r377928_fix
Configure the web server to be configured according to DoD security configuration guidance.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-APP-000416-WSR-000118
- Vuln IDs
-
- V-239371
- V-56017
- Rule IDs
-
- SV-239371r962034_rule
- SV-70271
Checks: C-42604r659514_chk
Review policy documents to identify data that is compartmentalized (i.e. classified, sensitive, need-to-know, etc.) and requires cryptographic protection. Review the web server documentation and deployed configuration to identify the encryption modules utilized to protect the compartmentalized data. If the encryption modules used to protect the compartmentalized data are not compliant with the data, this is a finding.
Fix: F-42563r659515_fix
Configure the web server to utilize cryptography when protecting compartmentalized data.
- RMF Control
- Severity
- M
- CCI
- CCI-003627
- Version
- SRG-APP-000700-WSR-000100
- Vuln IDs
-
- V-264337
- Rule IDs
-
- SV-264337r984356_rule
Checks: C-68250r984354_chk
Verify the web server is configured to disable accounts when the accounts have expired. If the web server is not configured to disable accounts when the accounts have expired, this is a finding.
Fix: F-68158r984355_fix
Configure the web server to disable accounts when the accounts have expired.
- RMF Control
- Severity
- M
- CCI
- CCI-003628
- Version
- SRG-APP-000705-WSR-000110
- Vuln IDs
-
- V-264338
- Rule IDs
-
- SV-264338r984359_rule
Checks: C-68251r984357_chk
Verify the web server is configured to disable accounts when the accounts are no longer associated to a user. If the web server is not configured to disable accounts when the accounts are no longer associated to a user, this is a finding.
Fix: F-68159r984358_fix
Configure the web server to disable accounts when the accounts are no longer associated to a user.
- RMF Control
- Severity
- M
- CCI
- CCI-003821
- Version
- SRG-APP-000745-WSR-000120
- Vuln IDs
-
- V-264339
- Rule IDs
-
- SV-264339r984362_rule
Checks: C-68252r984360_chk
Verify the web server is configured to implement the capability to centrally review and analyze audit records from multiple components within the system. If the web server is not configured to implement the capability to centrally review and analyze audit records from multiple components within the system, this is a finding.
Fix: F-68160r984361_fix
Configure the web server to implement the capability to centrally review and analyze audit records from multiple components within the system.
- RMF Control
- Severity
- M
- CCI
- CCI-003831
- Version
- SRG-APP-000795-WSR-000130
- Vuln IDs
-
- V-264340
- Rule IDs
-
- SV-264340r984365_rule
Checks: C-68253r984363_chk
Verify the web server is configured to alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information. If the web server is not configured to alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information, this is a finding.
Fix: F-68161r984364_fix
Configure the web server to alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information.
- RMF Control
- Severity
- M
- CCI
- CCI-003938
- Version
- SRG-APP-000805-WSR-000140
- Vuln IDs
-
- V-264341
- Rule IDs
-
- SV-264341r984368_rule
Checks: C-68254r984366_chk
Verify the web server is configured to automatically generate audit records of the enforcement actions. If the web server is not configured to automatically generate audit records of the enforcement actions, this is a finding.
Fix: F-68162r984367_fix
Configure the web server to automatically generate audit records of the enforcement actions.
- RMF Control
- Severity
- M
- CCI
- CCI-004045
- Version
- SRG-APP-000815-WSR-000160
- Vuln IDs
-
- V-264342
- Rule IDs
-
- SV-264342r984371_rule
Checks: C-68255r984369_chk
Verify the web server is configured to require users to be individually authenticated before granting access to the shared accounts or resources. If the web server is not configured to require users to be individually authenticated before granting access to the shared accounts or resources, this is a finding.
Fix: F-68163r984370_fix
Configure the web server to require users to be individually authenticated before granting access to the shared accounts or resources.
- RMF Control
- Severity
- M
- CCI
- CCI-004046
- Version
- SRG-APP-000820-WSR-000170
- Vuln IDs
-
- V-264343
- Rule IDs
-
- SV-264343r984374_rule
Checks: C-68256r984372_chk
Verify the web server is configured to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access. If the web server is not configured to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access, this is a finding.
Fix: F-68164r984373_fix
Configure the web server to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access.
- RMF Control
- Severity
- M
- CCI
- CCI-004047
- Version
- SRG-APP-000825-WSR-000180
- Vuln IDs
-
- V-264344
- Rule IDs
-
- SV-264344r984377_rule
Checks: C-68257r984375_chk
Verify the web server is configured to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements. If the web server is not configured to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements, this is a finding.
Fix: F-68165r984376_fix
Configure the web server to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements.
- RMF Control
- Severity
- M
- CCI
- CCI-004058
- Version
- SRG-APP-000830-WSR-000190
- Vuln IDs
-
- V-264345
- Rule IDs
-
- SV-264345r984380_rule
Checks: C-68258r984378_chk
Verify the web server is configured to maintain a list of commonly used, expected, or compromised passwords on an organization-defined frequency. If the web server is not configured to maintain a list of commonly used, expected, or compromised passwords on an organization-defined frequency, this is a finding.
Fix: F-68166r984379_fix
Configure the web server to maintain a list of commonly used, expected, or compromised passwords on an organization-defined frequency.
- RMF Control
- Severity
- M
- CCI
- CCI-004059
- Version
- SRG-APP-000835-WSR-000200
- Vuln IDs
-
- V-264346
- Rule IDs
-
- SV-264346r984383_rule
Checks: C-68259r984381_chk
Verify the web server is configured to update the list of passwords on an organization-defined frequency. If the web server is not configured to update the list of passwords on an organization-defined frequency, this is a finding.
Fix: F-68167r984382_fix
Configure the web server to update the list of passwords on an organization-defined frequency.
- RMF Control
- Severity
- M
- CCI
- CCI-004060
- Version
- SRG-APP-000840-WSR-000210
- Vuln IDs
-
- V-264347
- Rule IDs
-
- SV-264347r984386_rule
Checks: C-68260r984384_chk
Verify the web server is configured to update the list of passwords when organizational passwords are suspected to have been compromised directly or indirectly. If the web server is not configured to update the list of passwords when organizational passwords are suspected to have been compromised directly or indirectly, this is a finding.
Fix: F-68168r984385_fix
Configure the web server to update the list of passwords when organizational passwords are suspected to have been compromised directly or indirectly.
- RMF Control
- Severity
- M
- CCI
- CCI-004061
- Version
- SRG-APP-000845-WSR-000220
- Vuln IDs
-
- V-264348
- Rule IDs
-
- SV-264348r984389_rule
Checks: C-68261r984387_chk
Verify the web server is configured to verify when users create or update passwords, that the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a). If the web server is not configured to verify when users create or update passwords, that the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a), this is a finding.
Fix: F-68169r984388_fix
Configure the web server to verify when users create or update passwords, that the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a).
- RMF Control
- Severity
- M
- CCI
- CCI-004062
- Version
- SRG-APP-000850-WSR-000230
- Vuln IDs
-
- V-264349
- Rule IDs
-
- SV-264349r984392_rule
Checks: C-68262r984390_chk
Verify the web server is configured to store passwords using an approved salted key derivation function, preferably using a keyed hash. If the web server is not configured to store passwords using an approved salted key derivation function, preferably using a keyed hash, this is a finding.
Fix: F-68170r984391_fix
Configure the web server to store passwords using an approved salted key derivation function, preferably using a keyed hash.
- RMF Control
- Severity
- M
- CCI
- CCI-004063
- Version
- SRG-APP-000855-WSR-000240
- Vuln IDs
-
- V-264350
- Rule IDs
-
- SV-264350r984395_rule
Checks: C-68263r984393_chk
Verify the web server is configured to require immediate selection of a new password upon account recovery. If the web server is not configured to require immediate selection of a new password upon account recovery, this is a finding.
Fix: F-68171r984394_fix
Configure the web server to require immediate selection of a new password upon account recovery.
- RMF Control
- Severity
- M
- CCI
- CCI-004064
- Version
- SRG-APP-000860-WSR-000250
- Vuln IDs
-
- V-264351
- Rule IDs
-
- SV-264351r984398_rule
Checks: C-68264r984396_chk
Verify the web server is configured to allow user selection of long passwords and passphrases, including spaces and all printable characters. If the web server is not configured to allow user selection of long passwords and passphrases, including spaces and all printable characters, this is a finding.
Fix: F-68172r984397_fix
Configure the web server to allow user selection of long passwords and passphrases, including spaces and all printable characters.
- RMF Control
- Severity
- M
- CCI
- CCI-004065
- Version
- SRG-APP-000865-WSR-000260
- Vuln IDs
-
- V-264352
- Rule IDs
-
- SV-264352r984401_rule
Checks: C-68265r984399_chk
Verify the web server is configured to employ automated tools to assist the user in selecting strong password authenticators. If the web server is not configured to employ automated tools to assist the user in selecting strong password authenticators, this is a finding.
Fix: F-68173r984400_fix
Configure the web server to employ automated tools to assist the user in selecting strong password authenticators.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- SRG-APP-000870-WSR-000270
- Vuln IDs
-
- V-264353
- Rule IDs
-
- SV-264353r984404_rule
Checks: C-68266r984402_chk
Verify the web server is configured to enforce organization-defined composition and complexity rules. If the web server is not configured to enforce organization-defined composition and complexity rules, this is a finding.
Fix: F-68174r984403_fix
Configure the web server to enforce organization-defined composition and complexity rules.
- RMF Control
- Severity
- M
- CCI
- CCI-004068
- Version
- SRG-APP-000875-WSR-000280
- Vuln IDs
-
- V-264354
- Rule IDs
-
- SV-264354r984407_rule
Checks: C-68267r984405_chk
Verify the web server is configured to implement a local cache of revocation data to support path discovery and validation. If the web server is not configured to implement a local cache of revocation data to support path discovery and validation, this is a finding.
Fix: F-68175r984406_fix
Configure the web server to implement a local cache of revocation data to support path discovery and validation.
- RMF Control
- Severity
- M
- CCI
- CCI-004192
- Version
- SRG-APP-000880-WSR-000290
- Vuln IDs
-
- V-264355
- Rule IDs
-
- SV-264355r984410_rule
Checks: C-68268r984408_chk
Verify the web server is configured to protect nonlocal maintenance sessions by separating the maintenance session from other network sessions with the system by logically separated communications paths. If the web server is not configured to protect nonlocal maintenance sessions by separating the maintenance session from other network sessions with the system by logically separated communications paths, this is a finding.
Fix: F-68176r984409_fix
Configure the web server to protect nonlocal maintenance sessions by separating the maintenance session from other network sessions with the system by logically separated communications paths.
- RMF Control
- Severity
- M
- CCI
- CCI-004909
- Version
- SRG-APP-000910-WSR-000300
- Vuln IDs
-
- V-264356
- Rule IDs
-
- SV-264356r984413_rule
Checks: C-68269r984411_chk
Verify the web server is configured to include only approved trust anchors in trust stores or certificate stores managed by the organization. If the web server is not configured to include only approved trust anchors in trust stores or certificate stores managed by the organization, this is a finding.
Fix: F-68177r984412_fix
Configure the web server to include only approved trust anchors in trust stores or certificate stores managed by the organization.
- RMF Control
- Severity
- M
- CCI
- CCI-004910
- Version
- SRG-APP-000915-WSR-000310
- Vuln IDs
-
- V-264357
- Rule IDs
-
- SV-264357r984416_rule
Checks: C-68270r984414_chk
Verify the web server is configured to provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store. If the web server is not configured to provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store, this is a finding.
Fix: F-68178r984415_fix
Configure the web server to provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store.
- RMF Control
- Severity
- M
- CCI
- CCI-004922
- Version
- SRG-APP-000920-WSR-000320
- Vuln IDs
-
- V-264358
- Rule IDs
-
- SV-264358r984419_rule
Checks: C-68271r984417_chk
Verify the web server is configured to synchronize system clocks within and between systems or system components. If the web server is not configured to synchronize system clocks within and between systems or system components, this is a finding.
Fix: F-68179r984418_fix
Configure the web server to synchronize system clocks within and between systems or system components.
- RMF Control
- Severity
- M
- CCI
- CCI-004923
- Version
- SRG-APP-000925-WSR-000330
- Vuln IDs
-
- V-264359
- Rule IDs
-
- SV-264359r984422_rule
Checks: C-68272r984420_chk
Verify the web server is configured to compare the internal system clocks on an organization-defined frequency with organization-defined authoritative time source. If the web server is not configured to compare the internal system clocks on an organization-defined frequency with organization-defined authoritative time source, this is a finding.
Fix: F-68180r984421_fix
Configure the web server to compare the internal system clocks on an organization-defined frequency with organization-defined authoritative time source.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001184
- Version
- SRG-APP-000219-WSR-000190
- Vuln IDs
-
- V-264360
- Rule IDs
-
- SV-264360r984425_rule
Checks: C-68273r984423_chk
Verify the web server limits authenticated client management sessions to initial session source IP. If the web server does not limit authenticated client management sessions to initial session source IP, this is a finding.
Fix: F-68181r984424_fix
Configure the web server to restrict the management session to a consistent inbound IP for the entire management session.
- RMF Control
- SC-23
- Severity
- I
- CCI
- CCI-001184
- Version
- SRG-APP-000219-WSR-000191
- Vuln IDs
-
- V-264361
- Rule IDs
-
- SV-264361r984428_rule
Checks: C-68274r984426_chk
Verify the web server limits authenticated user sessions to a consistent inbound IP for the entire user session If the web server does not limit authenticated user sessions to a consistent inbound IP for the entire user session, this is a finding.
Fix: F-68182r984427_fix
Configure the web server to restrict the user session to a consistent inbound IP for the entire user session.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-APP-000439-WSR-000192
- Vuln IDs
-
- V-264362
- Rule IDs
-
- SV-264362r984431_rule
Checks: C-68275r984429_chk
Verify the web server uses HTTP/2. If the web server does not use HTTP/2 at a minimum, this is a finding.
Fix: F-68183r984430_fix
Configure the web server to use HTTP/2, at a minimum. Note that browsers support HTTP/2 only in HTTPS mode. The tunneling of HTTP/1.x through HTTPS is not an approved configuration.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-APP-000439-WSR-000193
- Vuln IDs
-
- V-264363
- Rule IDs
-
- SV-264363r984434_rule
Checks: C-68276r984432_chk
If HTTP downgrading is operationally necessary, and the rewritten request is validated against HTTP/1.x specification (i.e., verify requests that contain new lines in the headers, colons in header names, and spaces in the request method are rejected), mark as a CAT III finding. Verify that HTTP/1.x downgrading is disabled. If the HTTP/1.x downgrading is enabled, this is a finding.
Fix: F-68184r984433_fix
Configure the web server to disable HTTP/1.x downgrading. If HTTP downgrading is operationally necessary, validate the rewritten request against the HTTP/1.1 specification, i.e., reject requests that contain new lines in the headers, colons in header names, and spaces in the request method.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- SRG-APP-000251-WSR-000194
- Vuln IDs
-
- V-264364
- Rule IDs
-
- SV-264364r984437_rule
Checks: C-68277r984435_chk
Verify the web server normalizes ambiguous requests or terminates the TCP connection. If the web server does not drop ambiguous requests that cannot be normalized and terminate the TCP connection, this is a finding.
Fix: F-68185r984436_fix
Configure the web server to interpret HTTP headers so they are normalized and unambiguous. The web server must validate requests that report message body as "zero" in the HTTP header. Configure the web server to drop ambiguous requests that cannot be normalized and terminate the TCP connection.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- SRG-APP-000251-WSR-000195
- Vuln IDs
-
- V-264365
- Rule IDs
-
- SV-264365r984440_rule
Checks: C-68278r984438_chk
Verify the web server terminates the connection if server-level exceptions are triggered when handling requests. If the web server does not terminate the connection if server-level exceptions are triggered when handling requests, this is a finding.
Fix: F-68186r984439_fix
Configure web server to terminate the connection if server-level exceptions are triggered when handling requests to prevent HTTP request smuggling attacks.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-APP-000439-WSR-000196
- Vuln IDs
-
- V-264366
- Rule IDs
-
- SV-264366r984443_rule
Checks: C-68279r984441_chk
If a forward proxy is not used, this is not applicable. Verify the web server only uses forward proxies that route HTTP/2 requests upstream. If the web server uses forward proxies that do not only route HTTP/2 requests, this is a finding.
Fix: F-68187r984442_fix
Configure the web server to only use forward proxies that route HTTP/2 requests upstream.