Apache Server 2.4 UNIX Server Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000246-WSR-000149
Group -
The Apache web server must be tuned to handle the operational requirements of the hosted application.
A denial of service (DoS) can occur when the Apache web server is so overwhelmed that it can no longer respond to additional requests. A web server not properly tuned may become overwhelmed and cau...Rule Medium Severity -
SRG-APP-000266-WSR-000159
Group -
SRG-APP-000266-WSR-000160
Group -
Debugging and trace information used to diagnose the Apache web server must be disabled.
Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information about the web server and plug-ins or modules being used. When debugging or ...Rule Medium Severity -
SRG-APP-000295-WSR-000134
Group -
The Apache web server must set an inactive timeout for sessions.
Leaving sessions open indefinitely is a major security risk. An attacker can easily use an already authenticated session to access the hosted application as the previously authenticated user. By cl...Rule Medium Severity -
SRG-APP-000315-WSR-000004
Group -
The Apache web server must restrict inbound connections from nonsecure zones.
Remote access to the Apache web server is any access that communicates through an external, non-organization-controlled network. Remote access can be used to access hosted applications or to perfor...Rule Medium Severity -
SRG-APP-000316-WSR-000170
Group -
SRG-APP-000340-WSR-000029
Group -
Non-privileged accounts on the hosting system must only access Apache web server security-relevant information and functions through a distinct administrative account.
By separating Apache web server security functions from non-privileged users, roles can be developed that can then be used to administer the Apache web server. Forcing users to change from a non-pr...Rule Medium Severity -
SRG-APP-000357-WSR-000150
Group -
The Apache web server must use a logging mechanism that is configured to allocate log record storage capacity large enough to accommodate the logging requirements of the Apache web server.
To make certain that the logging mechanism used by the web server has sufficient storage capacity in which to write the logs, the logging mechanism needs to be able to allocate log record storage c...Rule Medium Severity -
SRG-APP-000358-WSR-000063
Group -
The Apache web server must not impede the ability to write specified log record content to an audit log server.
Writing events to a centralized management audit system offers many benefits to the enterprise over having dispersed logs. Centralized management of audit records and logs provides for efficiency i...Rule Medium Severity -
SRG-APP-000358-WSR-000163
Group -
SRG-APP-000374-WSR-000172
Group -
The Apache web server must generate log records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT) which are stamped at a minimum granularity of one second.
If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analysis across multiple devices and log records. Time stamps generated by th...Rule Medium Severity -
SRG-APP-000383-WSR-000175
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.