Skip to content

Apache Server 2.4 UNIX Server Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000246-WSR-000149

    Group
  • The Apache web server must be tuned to handle the operational requirements of the hosted application.

    A denial of service (DoS) can occur when the Apache web server is so overwhelmed that it can no longer respond to additional requests. A web server not properly tuned may become overwhelmed and cau...
    Rule Medium Severity
  • SRG-APP-000266-WSR-000159

    Group
  • SRG-APP-000266-WSR-000160

    Group
  • Debugging and trace information used to diagnose the Apache web server must be disabled.

    Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information about the web server and plug-ins or modules being used. When debugging or ...
    Rule Medium Severity
  • SRG-APP-000295-WSR-000134

    Group
  • The Apache web server must set an inactive timeout for sessions.

    Leaving sessions open indefinitely is a major security risk. An attacker can easily use an already authenticated session to access the hosted application as the previously authenticated user. By cl...
    Rule Medium Severity
  • SRG-APP-000315-WSR-000004

    Group
  • The Apache web server must restrict inbound connections from nonsecure zones.

    Remote access to the Apache web server is any access that communicates through an external, non-organization-controlled network. Remote access can be used to access hosted applications or to perfor...
    Rule Medium Severity
  • SRG-APP-000316-WSR-000170

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules