Skip to content

APACHE 2.2 Server for UNIX Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The KeepAlive directive must be enabled.

    <VulnDiscussion>The KeepAlive extension to HTTP/1.0 and the persistent connection feature of HTTP/1.1 provide long lived HTTP sessions which ...
    Rule Medium Severity
  • WA000-WWA024

    <GroupDescription></GroupDescription>
    Group
  • The KeepAliveTimeout directive must be defined.

    &lt;VulnDiscussion&gt;The number of seconds Apache will wait for a subsequent request before closing the connection. Once a request has been receiv...
    Rule Medium Severity
  • WA000-WWA026

    <GroupDescription></GroupDescription>
    Group
  • The httpd.conf MinSpareServers directive must be set properly.

    &lt;VulnDiscussion&gt;These requirements are set to mitigate the effects of several types of denial of service attacks. Although there is some lati...
    Rule Medium Severity
  • WA000-WWA030

    <GroupDescription></GroupDescription>
    Group
  • The httpd.conf MaxSpareServers directive must be set properly.

    &lt;VulnDiscussion&gt;These requirements are set to mitigate the effects of several types of denial of service attacks. Although there is some lati...
    Rule Low Severity
  • WA000-WWA032

    <GroupDescription></GroupDescription>
    Group
  • The httpd.conf MaxClients directive must be set properly.

    &lt;VulnDiscussion&gt;These requirements are set to mitigate the effects of several types of denial of service attacks. Although there is some lati...
    Rule Medium Severity
  • WA000-WWA050

    <GroupDescription></GroupDescription>
    Group
  • All interactive programs must be placed in a designated directory with appropriate permissions.

    &lt;VulnDiscussion&gt;Directory options directives are directives that can be applied to further restrict access to file and directories. The Opti...
    Rule Medium Severity
  • WA000-WWA052

    <GroupDescription></GroupDescription>
    Group
  • WA000-WWA054

    <GroupDescription></GroupDescription>
    Group
  • Server side includes (SSIs) must run with execution capability disabled.

    &lt;VulnDiscussion&gt;The Options directive configures the web server features that are available in particular directories. The IncludesNOEXEC fe...
    Rule High Severity
  • WA000-WWA056

    <GroupDescription></GroupDescription>
    Group
  • The MultiViews directive must be disabled.

    &lt;VulnDiscussion&gt;Directory options directives are directives that can be applied to further restrict access to file and directories. MultiView...
    Rule Medium Severity
  • WA000-WWA058

    <GroupDescription></GroupDescription>
    Group
  • Directory indexing must be disabled on directories not containing index files.

    &lt;VulnDiscussion&gt;Directory options directives are directives that can be applied to further restrict access to file and directories. If a URL...
    Rule Medium Severity
  • WA000-WWA060

    <GroupDescription></GroupDescription>
    Group
  • The HTTP request message body size must be limited.

    &lt;VulnDiscussion&gt;Buffer overflow attacks are carried out by a malicious attacker sending amounts of data that the web server cannot store in a...
    Rule Medium Severity
  • WA000-WWA062

    <GroupDescription></GroupDescription>
    Group
  • Web Distributed Authoring and Versioning (WebDAV) must be disabled.

    &lt;VulnDiscussion&gt;The Apache mod_dav and mod_dav_fs modules support WebDAV ('Web-based Distributed Authoring and Versioning') functionality for...
    Rule Medium Severity
  • WA00510

    <GroupDescription></GroupDescription>
    Group
  • The HTTP request header fields must be limited.

    &lt;VulnDiscussion&gt;Buffer overflow attacks are carried out by a malicious attacker sending amounts of data that the web server cannot store in a...
    Rule Medium Severity
  • WA000-WWA064

    <GroupDescription></GroupDescription>
    Group
  • The HTTP request header field size must be limited.

    &lt;VulnDiscussion&gt;Buffer overflow attacks are carried out by a malicious attacker sending amounts of data that the web server cannot store in a...
    Rule Medium Severity
  • WA000-WWA066

    <GroupDescription></GroupDescription>
    Group
  • The HTTP request line must be limited.

    &lt;VulnDiscussion&gt;Buffer overflow attacks are carried out by a malicious attacker sending amounts of data that the web server cannot store in a...
    Rule Medium Severity
  • WA00500

    <GroupDescription></GroupDescription>
    Group
  • Active software modules must be minimized.

    &lt;VulnDiscussion&gt;Modules are the source of Apache httpd servers core and dynamic capabilities. Thus not every module available is needed for o...
    Rule Medium Severity
  • WA00505

    <GroupDescription></GroupDescription>
    Group
  • Web server status module must be disabled.

    &lt;VulnDiscussion&gt;The Apache mod_info module provides information on the server configuration via access to a /server-info URL location, while ...
    Rule Medium Severity
  • WA00520

    <GroupDescription></GroupDescription>
    Group
  • The web server must not be configured as a proxy server.

    &lt;VulnDiscussion&gt;The Apache proxy modules allow the server to act as a proxy (either forward or reverse proxy) of http and other protocols wit...
    Rule Medium Severity
  • WA00525

    <GroupDescription></GroupDescription>
    Group
  • User specific directories must not be globally enabled.

    &lt;VulnDiscussion&gt;The UserDir directive must be disabled so that user home directories are not accessed via the web site with a tilde (~) prece...
    Rule Medium Severity
  • WA00530

    <GroupDescription></GroupDescription>
    Group
  • The process ID (PID) file must be properly secured.

    &lt;VulnDiscussion&gt;The PidFile directive sets the file path to the process ID file to which the server records the process id of the server, whi...
    Rule Medium Severity
  • WA00535

    <GroupDescription></GroupDescription>
    Group
  • The score board file must be properly secured.

    &lt;VulnDiscussion&gt;The ScoreBoardfile directive sets a file path which the server will use for Inter-Process Communication (IPC) among the Apach...
    Rule Medium Severity
  • WA00540

    <GroupDescription></GroupDescription>
    Group
  • The web server must be configured to explicitly deny access to the OS root.

    &lt;VulnDiscussion&gt;The Apache Directory directive allows for directory specific configuration of access controls and many other features and opt...
    Rule Medium Severity
  • WA00545

    <GroupDescription></GroupDescription>
    Group
  • Web server options for the OS root must be disabled.

    &lt;VulnDiscussion&gt;The Apache Options directive allows for specific configuration of options, including execution of CGI, following symbolic lin...
    Rule Medium Severity
  • WA00550

    <GroupDescription></GroupDescription>
    Group
  • The TRACE method must be disabled.

    &lt;VulnDiscussion&gt;Diagnostics help establish a history of activities, and can be useful in detecting attack attempts or determining tuning adju...
    Rule Medium Severity
  • WA00555

    <GroupDescription></GroupDescription>
    Group
  • The web server must be configured to listen on a specific IP address and port.

    &lt;VulnDiscussion&gt;The Apache Listen directive specifies the IP addresses and port numbers the Apache web server will listen for requests. Rathe...
    Rule Medium Severity
  • WA00560

    <GroupDescription></GroupDescription>
    Group
  • The URL-path name must be set to the file path name or the directory path name.

    &lt;VulnDiscussion&gt;The ScriptAlias directive controls which directories the Apache server "sees" as containing scripts. If the directive uses a...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules