Skip to content

Apache Server 2.4 UNIX Server Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The Apache web server must prohibit or restrict the use of nonsecure or unnecessary ports, protocols, modules, and/or services.

    Web servers provide numerous processes, features, and functionalities that use TCP/IP ports. Some of these processes may be deemed unnecessary or too unsecure to run on a production system. The Ap...
    Rule Medium Severity
  • SRG-APP-000435-WSR-000147

    Group
  • The Apache web server must be protected from being stopped by a non-privileged user.

    An attacker has at least two reasons to stop a web server. The first is to cause a denial of service (DoS), and the second is to put in place changes the attacker made to the web server configurati...
    Rule Medium Severity
  • SRG-APP-000439-WSR-000154

    Group
  • Cookies exchanged between the Apache web server and the client, such as session cookies, must have cookie properties set to prohibit client-side scripts from reading the cookie data.

    A cookie can be read by client-side scripts easily if cookie properties are not set properly. By allowing cookies to be read by the client-side scripts, information such as session identifiers coul...
    Rule Medium Severity
  • SRG-APP-000439-WSR-000188

    Group
  • SRG-APP-000456-WSR-000187

    Group
  • The Apache web server must install security-relevant software updates within the configured time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).

    Security flaws with software applications are discovered daily. Vendors are constantly updating and patching their products to address newly discovered security vulnerabilities. Organizations (incl...
    Rule Medium Severity
  • SRG-APP-000516-WSR-000079

    Group
  • SRG-APP-000516-WSR-000174

    Group
  • SRG-APP-000516-WSR-000174

    Group
  • The Apache web server software must be a vendor-supported version.

    Many vulnerabilities are associated with older versions of web server software. As hot fixes and patches are issued, these solutions are included in the next version of the server software. Maintai...
    Rule High Severity
  • SRG-APP-000516-WSR-000174

    Group
  • The Apache web server must limit the number of allowed simultaneous session requests.

    Apache web server management includes the ability to control the number of users and user sessions that utilize an Apache web server. Limiting the number of allowed users and sessions per user is h...
    Rule Medium Severity
  • The Apache web server must perform server-side session management.

    Session management is the practice of protecting the bulk of the user authorization and identity information. This data can be stored on the client system or on the server. When the session inform...
    Rule Medium Severity
  • The Apache web server must use cryptography to protect the integrity of remote sessions.

    Data exchanged between the user and the Apache web server can range from static display data to credentials used to log on to the hosted application. Even when data appears to be static, the non-di...
    Rule Medium Severity
  • The Apache web server must generate, at a minimum, log records for system startup and shutdown, system access, and system authentication events.

    Log records can be generated from various components within the Apache web server (e.g., httpd, plug-ins to external backends, etc.). From a web server perspective, certain specific Apache web serv...
    Rule Medium Severity
  • An Apache web server, behind a load balancer or proxy server, must produce log records containing the client IP information as the source and destination and not the load balancer or proxy IP information with each event.

    Apache web server logging capability is critical for accurate forensic analysis. Without sufficient and accurate information, a correct replay of the events cannot be determined. Ascertaining the ...
    Rule Medium Severity
  • The Apache web server must use a logging mechanism that is configured to alert the Information System Security Officer (ISSO) and System Administrator (SA) in the event of a processing failure.

    Reviewing log data allows an investigator to recreate the path of an attacker and to capture forensic data for later use. Log data is also essential to SAs in their daily administrative duties on t...
    Rule Medium Severity
  • The Apache web server log files must only be accessible by privileged users.

    Log data is essential in the investigation of events. If log data were to become compromised, competent forensic analysis and discovery of the true source of potentially malicious system activity w...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules