Skip to content

Apache Server 2.4 Windows Site Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Debugging and trace information used to diagnose the Apache web server must be disabled.

    Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information about the web server and plug-ins or modules being used. When debugging or t...
    Rule Medium Severity
  • SRG-APP-000295-WSR-000012

    Group
  • The Apache web server must set an absolute timeout for sessions.

    Leaving sessions open indefinitely is a major security risk. An attacker can easily use an already authenticated session to access the hosted application as the previously authenticated user. By cl...
    Rule Medium Severity
  • SRG-APP-000295-WSR-000134

    Group
  • SRG-APP-000315-WSR-000004

    Group
  • The Apache web server must restrict inbound connections from nonsecure zones.

    Remote access to the web server is any access that communicates through an external, non-organization-controlled network. Remote access can be used to access hosted applications or to perform manag...
    Rule Medium Severity
  • SRG-APP-000340-WSR-000029

    Group
  • Non-privileged accounts on the hosting system must only access Apache web server security-relevant information and functions through a distinct administrative account.

    By separating web server security functions from non-privileged users, roles can be developed that can then be used to administer the web server. Forcing users to change from a non-privileged accou...
    Rule Medium Severity
  • SRG-APP-000383-WSR-000175

    Group
  • The Apache web server must prohibit or restrict the use of nonsecure or unnecessary ports, protocols, modules, and/or services.

    Web servers provide numerous processes, features, and functionalities that use TCP/IP ports. Some of these processes may be deemed unnecessary or too unsecure to run on a production system. The we...
    Rule Medium Severity
  • SRG-APP-000427-WSR-000186

    Group
  • The Apache web server must only accept client certificates issued by DoD PKI or DoD-approved PKI Certification Authorities (CAs).

    Non-DoD-approved PKIs have not been evaluated to ensure that they have security controls and identity vetting procedures in place that are sufficient for DoD systems to rely on the identity asserte...
    Rule Medium Severity
  • SRG-APP-000435-WSR-000148

    Group
  • SRG-APP-000439-WSR-000153

    Group
  • SRG-APP-000439-WSR-000154

    Group
  • Cookies exchanged between the Apache web server and the client, such as session cookies, must have cookie properties set to prohibit client-side scripts from reading the cookie data.

    A cookie can be read by client-side scripts easily if cookie properties are not set properly. By allowing cookies to be read by the client-side scripts, information such as session identifiers coul...
    Rule Medium Severity
  • SRG-APP-000439-WSR-000155

    Group
  • Cookies exchanged between the Apache web server and the client, such as session cookies, must have cookie properties set to force the encryption of cookies.

    Cookies can be sent to a client using TLS/SSL to encrypt the cookies, but TLS/SSL is not used by every hosted application since the data being displayed does not require the encryption of the trans...
    Rule Medium Severity
  • SRG-APP-000014-WSR-000006

    Group
  • SRG-APP-000516-WSR-000174

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules