Disable Firefox Development Tools
Ensure rsyslog is Installed
Ensure syslog-ng is Installed
Verify permissions of log files
The A10 Networks ADC, when used to load balance web applications, must strip HTTP response headers.
The A10 Networks ADC, when used to load balance web applications, must replace response codes.
Warning and error messages displayed to clients must be modified to minimize the identity of the Apache web server, patches, loaded modules, and directory paths.
Debugging and trace information used to diagnose the Apache web server must be disabled.
The Apache web server must display a default hosted application web page, not a directory listing, when a requested web page cannot be found.
The ALG must generate error messages that provide the information necessary for corrective actions without revealing information that could be exploited by adversaries.
The application server must identify potentially security-relevant error conditions.
The application server must only generate error messages that provide information necessary for corrective actions without revealing sensitive or potentially harmful information in error logs and administrative messages.
The application must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
The CA API Gateway must generate error messages that provide the information necessary for corrective actions without revealing information that could be exploited by adversaries.
IDMS must suppress security-related messages so that no information is returned that can be exploited.
Custom database code and associated application code must not contain information beyond what is needed for troubleshooting.
The DBMS must provide non-privileged users with error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
Forescout must reveal error messages only to the Information System Security Officer (ISSO), Information System Security Manager (ISSM), and System Administrator (SA). This is required for compliance with C2C Step 1.
The DataPower Gateway must have ICMP responses disabled on all interfaces facing untrusted networks.
The MQ Appliance messaging server must identify potentially security-relevant error conditions.
The WebSphere Liberty Server must log remote session and security activity.
DB2 must provide non-privileged users with error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
The WebSphere Application Server security auditing must be enabled.
The IDPS must block outbound ICMP Destination Unreachable, Redirect, and Address Mask reply messages.
The IDPS must block malicious ICMP packets by properly configuring ICMP signatures and rules.
The Juniper SRX Services Gateway Firewall must configure ICMP to meet DoD requirements.
The Mainframe Product must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
Firefox development tools must be disabled.
The DBMS and associated applications must provide non-privileged users with error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
The DNS Name Server software must be configured to refuse queries for its version information.
The HINFO, RP, TXT and LOC RR types must not be used in the zone SOA.
Nutanix AOS must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
OHS must display a default hosted application web page, not a directory listing, when a requested web page cannot be found.
OHS must have the ServerSignature directive disabled.
OHS must have the ServerTokens directive set to limit the response header.
OHS must have the Alias /error directive defined to reference the directory accompanying the ErrorDocument directives to minimize the identity of OHS, patches, loaded modules, and directory paths in warning and error messages displayed to clients.
OHS must have the permissions set properly via the Directory directive accompanying the ErrorDocument directives to minimize improper access to the warning and error messages displayed to clients.
OHS must have defined error pages for common error codes that minimize the identity of the web server, patches, loaded modules, and directory paths.
OHS must have production information removed from error documents to minimize the identity of OHS, patches, loaded modules, and directory paths in warning and error messages displayed to clients.
Debugging and trace information used to diagnose OHS must be disabled.
Prisma Cloud Compute must not write sensitive data to event logs.
Oracle WebLogic must identify potentially security-relevant error conditions.
Oracle WebLogic must only generate error messages that provide information necessary for corrective actions without revealing sensitive or potentially harmful information in error logs and administrative messages.
The SDN controller must be configured to generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
Symantec ProxySG must tailor the Exceptions messages to generate error messages that provide the information necessary for corrective actions without revealing information that could be exploited by adversaries.
The Tanium application must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
The TPS must block outbound ICMP Destination Unreachable, Redirect, and Address Mask reply messages.
The TPS must block malicious ICMP packets by properly configuring ICMP signatures and rules.
The UEM server must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
ErrorReportValve showServerInfo must be set to false.
The macOS system must disable sending diagnostic and usage data to Apple.
The macOS system must configure Apple System Log files to be owned by root and group to wheel.
The macOS system must configure Apple System Log files to mode 640 or less permissive.
The macOS system must configure system log files to be owned by root and group to wheel.
The macOS system must configure system log files to mode 640 or less permissive.
The Ubuntu operating system must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
PostgreSQL must provide non-privileged users with error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
The container platform must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
The EDB Postgres Advanced Server must provide nonprivileged users with error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
Chrome development tools must be disabled.
The operating system must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
SSMC must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
MarkLogic Server must provide non-privileged users with error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
MongoDB must provide non-privileged users with error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
Internet Explorer Development Tools Must Be Disabled.
Warning and error messages displayed to clients must be modified to minimize the identity of the IIS 10.0 website, patches, loaded modules, and directory paths.
Debugging and trace information used to diagnose the IIS 10.0 website must be disabled.
The IIS 10.0 web server Indexing must only index web content.
Warning and error messages displayed to clients must be modified to minimize the identity of the IIS 10.0 web server, patches, loaded modules, and directory paths.
HTTPAPI Server version must be removed from the HTTP Response Header information.
ASP.NET version must be removed from the HTTP Response Header information.
SQL Server must provide non-privileged users with error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
Windows Telemetry must not be configured to Full.
Windows Server 2022 administrative accounts must not be used with applications that access the internet, such as web browsers, or with potential internet sources, such as email.
The DBMS must only generate error messages that provide information necessary for corrective actions without revealing organization-defined sensitive or potentially harmful information in error logs and administrative messages that could be exploited.
The Palo Alto Networks security platform must block outbound ICMP Destination Unreachable, Redirect, and Address Mask reply messages.
The Palo Alto Networks security platform must block malicious ICMP packets.
The Automation Controller NGINX web server must display a default hosted application web page, not a directory listing, when a requested web page cannot be found.
Debugging and trace information, within Automation Controller NGINX web server, used to diagnose the web server must be disabled.
The SUSE operating system must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
The VMM must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
VAMI must disable directory browsing.
VAMI must not be configured to use "mod_status".
VAMI must have debug logging disabled.
VAMI must be configured to hide the server type and version in client responses.
Performance Charts must set the welcome-file node to a default web page.
Performance Charts must not show directory listings.
Performance Charts must be configured to show error pages with minimal information.
Performance Charts must be configured to not show error reports.
Performance Charts must hide the server version.
Performance Charts must not enable support for TRACE requests.
Performance Charts must have the debug option turned off.
ESX Agent Manager must set the welcome-file node to a default web page.
ESX Agent Manager must not show directory listings.
ESX Agent Manager must be configured to show error pages with minimal information.
ESX Agent Manager must be configured to not show error reports.
ESX Agent Manager must hide the server version.
ESX Agent Manager must not enable support for TRACE requests.
ESX Agent Manager must have the debug option disabled.
Lookup Service must set the welcome-file node to a default web page.
The Lookup Service must not show directory listings.
Lookup Service must be configured to hide the server version.
Lookup Service must be configured to show error pages with minimal information.
Lookup Service must not enable support for TRACE requests.
Lookup Service must have the debug option turned off.
VMware Postgres must provide nonprivileged users with minimal error information.
The Security Token Service must set the welcome-file node to a default web page.
The Security Token Service must not show directory listings.
The Security Token Service must be configured to not show error reports.
The Security Token Service must not enable support for TRACE requests.
The Security Token Service must have the debug option disabled.
The vCenter ESX Agent Manager service "ErrorReportValve showServerInfo" must be set to "false".
The vCenter Lookup service "ErrorReportValve showServerInfo" must be set to "false".
vSphere UI must set the welcome-file node to a default web page.
The vSphere UI must not show directory listings.
vSphere UI must be configured to hide the server version.
vSphere UI must be configured to show error pages with minimal information.
vSphere UI must not enable support for TRACE requests.
vSphere UI must have the debug option turned off.
The vCenter Perfcharts service "ErrorReportValve showServerInfo" must be set to "false".
The Photon operating system /var/log directory must be restricted.
The vCenter PostgreSQL service must provide nonprivileged users with minimal error information.
The vCenter STS service "ErrorReportValve showServerInfo" must be set to "false".
The vCenter UI service "ErrorReportValve showServerInfo" must be set to "false".
The vCenter VAMI service must disable directory listing.
The vCenter VAMI service must not be configured to use the "mod_status" module.
The vCenter VAMI service must have debug logging disabled.
The web server must display a default hosted application web page, not a directory listing, when a requested web page cannot be found.
Warning and error messages displayed to clients must be modified to minimize the identity of the web server, patches, loaded modules, and directory paths.
Debugging and trace information used to diagnose the web server must be disabled.
The EDB Postgres Advanced Server must provide non-privileged users with error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
The macOS system must configure Apple System Log (ASL) files owned by root and group to wheel.
The macOS system must configure Apple System Log (ASL) files to mode 640 or less permissive.
The macOS system must configure system log files owned by root and group to wheel.
Ubuntu 22.04 LTS must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
Ubuntu 22.04 LTS must generate system journal entries without revealing information that could be exploited by adversaries.
Ubuntu 22.04 LTS must be configured so that the "journalctl" command is not accessible by unauthorized users.
PostgreSQL must provide nonprivileged users with error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
The Enterprise Voice, Video, and Messaging Session Manager must be configured to generate session (call) records that provide information necessary for corrective actions without revealing personally identifiable information or sensitive information.
MongoDB must provide nonprivileged users with error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
SLEM 5 must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.