Skip to content

Oracle HTTP Server 12.1.3 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000442-WSR-000182

    Group
  • SRG-APP-000442-WSR-000182

    Group
  • If using the WebLogic Web Server Proxy Plugin and configuring SSL termination at OHS, OHS must have the WLProxySSL directive enabled to maintain the confidentiality and integrity of information during reception.

    Information can be either unintentionally or maliciously disclosed or modified during reception, including, for example, during aggregation, at protocol transformation points, and during packing/un...
    Rule Medium Severity
  • SRG-APP-000266-WSR-000142

    Group
  • SRG-APP-000416-WSR-000118

    Group
  • SRG-APP-000266-WSR-000159

    Group
  • OHS must have the ServerSignature directive disabled.

    Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information about the web server, backend systems being accessed, and plug-ins or module...
    Rule Medium Severity
  • SRG-APP-000266-WSR-000159

    Group
  • SRG-APP-000266-WSR-000159

    Group
  • OHS must have the Alias /error directive defined to reference the directory accompanying the ErrorDocument directives to minimize the identity of OHS, patches, loaded modules, and directory paths in warning and error messages displayed to clients.

    Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information about the web server, backend systems being accessed, and plug-ins or module...
    Rule Medium Severity
  • SRG-APP-000266-WSR-000159

    Group
  • SRG-APP-000266-WSR-000159

    Group
  • OHS must have defined error pages for common error codes that minimize the identity of the web server, patches, loaded modules, and directory paths.

    Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information about the web server, backend systems being accessed, and plug-ins or module...
    Rule Low Severity
  • SRG-APP-000266-WSR-000159

    Group
  • SRG-APP-000266-WSR-000160

    Group
  • Debugging and trace information used to diagnose OHS must be disabled.

    Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information about the web server and plug-ins or modules being used. When debugging or t...
    Rule Medium Severity
  • SRG-APP-000516-WSR-000079

    Group
  • OHS must have the LoadModule ossl_module directive enabled to implement required cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance when encrypting data that must be compartmentalized.

    Cryptography is only as strong as the encryption modules/algorithms employed to encrypt the data. Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to p...
    Rule High Severity
  • SRG-APP-000416-WSR-000118

    Group
  • OHS must have the SSLFIPS directive enabled to implement required cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance when encrypting data that must be compartmentalized.

    Cryptography is only as strong as the encryption modules/algorithms employed to encrypt the data. Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to p...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules