Skip to content

APACHE 2.2 Server for UNIX Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • All interactive programs must be placed in a designated directory with appropriate permissions.

    <VulnDiscussion>Directory options directives are directives that can be applied to further restrict access to file and directories. The Opti...
    Rule Medium Severity
  • WA000-WWA052

    <GroupDescription></GroupDescription>
    Group
  • WA000-WWA054

    <GroupDescription></GroupDescription>
    Group
  • Server side includes (SSIs) must run with execution capability disabled.

    &lt;VulnDiscussion&gt;The Options directive configures the web server features that are available in particular directories. The IncludesNOEXEC fe...
    Rule High Severity
  • WA000-WWA056

    <GroupDescription></GroupDescription>
    Group
  • The MultiViews directive must be disabled.

    &lt;VulnDiscussion&gt;Directory options directives are directives that can be applied to further restrict access to file and directories. MultiView...
    Rule Medium Severity
  • WA000-WWA058

    <GroupDescription></GroupDescription>
    Group
  • Directory indexing must be disabled on directories not containing index files.

    &lt;VulnDiscussion&gt;Directory options directives are directives that can be applied to further restrict access to file and directories. If a URL...
    Rule Medium Severity
  • WA000-WWA060

    <GroupDescription></GroupDescription>
    Group
  • The HTTP request message body size must be limited.

    &lt;VulnDiscussion&gt;Buffer overflow attacks are carried out by a malicious attacker sending amounts of data that the web server cannot store in a...
    Rule Medium Severity
  • WA000-WWA062

    <GroupDescription></GroupDescription>
    Group
  • Web Distributed Authoring and Versioning (WebDAV) must be disabled.

    &lt;VulnDiscussion&gt;The Apache mod_dav and mod_dav_fs modules support WebDAV ('Web-based Distributed Authoring and Versioning') functionality for...
    Rule Medium Severity
  • WA00510

    <GroupDescription></GroupDescription>
    Group
  • The HTTP request header fields must be limited.

    &lt;VulnDiscussion&gt;Buffer overflow attacks are carried out by a malicious attacker sending amounts of data that the web server cannot store in a...
    Rule Medium Severity
  • WA000-WWA064

    <GroupDescription></GroupDescription>
    Group
  • The HTTP request header field size must be limited.

    &lt;VulnDiscussion&gt;Buffer overflow attacks are carried out by a malicious attacker sending amounts of data that the web server cannot store in a...
    Rule Medium Severity
  • WA000-WWA066

    <GroupDescription></GroupDescription>
    Group
  • The HTTP request line must be limited.

    &lt;VulnDiscussion&gt;Buffer overflow attacks are carried out by a malicious attacker sending amounts of data that the web server cannot store in a...
    Rule Medium Severity
  • WA00500

    <GroupDescription></GroupDescription>
    Group
  • Active software modules must be minimized.

    &lt;VulnDiscussion&gt;Modules are the source of Apache httpd servers core and dynamic capabilities. Thus not every module available is needed for o...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules