Skip to content

APACHE 2.2 Server for Windows Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • WA000-WWA052

    Group
  • The FollowSymLinks setting must be disabled.

    The Options directive configures the web server features that are available in particular directories. The FollowSymLinks option controls the ability of the server to follow symbolic links. A symbo...
    Rule Medium Severity
  • WA000-WWA054

    Group
  • Server side includes (SSIs) must run with execution capability disabled.

    The Options directive configures the web server features that are available in particular directories. The IncludesNOEXEC feature controls the ability of the server to utilize SSIs while disabling...
    Rule High Severity
  • WA000-WWA056

    Group
  • WA000-WWA058

    Group
  • Directory indexing must be disabled on directories not containing index files.

    Directory options directives are directives that can be applied to further restrict access to file and directories. If a URL which maps to a directory is requested, and there is no DirectoryIndex ...
    Rule Medium Severity
  • WA000-WWA060

    Group
  • WA000-WWA062

    Group
  • The HTTP request header fields must be limited.

    Buffer overflow attacks are carried out by a malicious attacker sending amounts of data that the web server cannot store in a given size buffer. The eventual overflow of this buffer can overwrite s...
    Rule Medium Severity
  • WA000-WWA064

    Group
  • WA000-WWA066

    Group
  • User specific directories must not be globally enabled.

    The UserDir directive must be disabled so that user home directories are not accessed via the web site with a tilde (~) preceding the username. The directive also sets the path name of the director...
    Rule Medium Severity
  • WA00530

    Group
  • WA00500

    Group
  • Active software modules must be minimized.

    Modules are the source of Apache httpd servers core and dynamic capabilities. Thus not every module available is needed for operation. Most installations only need a small subset of the modules ava...
    Rule Medium Severity
  • WA00505

    Group
  • Web Distributed Authoring and Versioning (WebDAV) must be disabled.

    The Apache mod_dav and mod_dav_fs modules support WebDAV ('Web-based Distributed Authoring and Versioning') functionality for Apache. WebDAV is an extension to the HTTP protocol which allows client...
    Rule Medium Severity
  • WA00510

    Group
  • Web server status module must be disabled.

    The Apache mod_info module provides information on the server configuration via access to a /server-info URL location, while the mod_status module provides current server performance statistics. Wh...
    Rule Medium Severity
  • WA00520

    Group
  • The web server must not be configured as a proxy server.

    The Apache proxy modules allow the server to act as a proxy (either forward or reverse proxy) of http and other protocols with additional proxy modules loaded. If the Apache installation is not int...
    Rule Medium Severity
  • WA00525

    Group
  • WA00535

    Group
  • The ScoreBoard file must be properly secured.

    The ScoreBoardFile directive sets a file path which the server will use for Inter-Process Communication (IPC) among the Apache processes. If the directive is specified, then Apache will use the con...
    Rule Medium Severity
  • WA00540

    Group
  • The web server must be configured to explicitly deny access to the OS root.

    The Apache Directory directive allows for directory specific configuration of access controls and many other features and options. One important usage is to create a default deny policy that does n...
    Rule Medium Severity
  • WA00545

    Group
  • Web server options for the OS root must be disabled.

    The Apache Options directive allows for specific configuration of options, including execution of CGI, following symbolic links, server side includes, and content negotiation. The Options directive...
    Rule Medium Severity
  • WA00550

    Group
  • The TRACE method must be disabled.

    Use the Apache TraceEnable directive to disable the HTTP TRACE request method. Refer to the Apache documentation for more details http://httpd.apache.org/docs/2.2/mod/core.html#traceenable. The HT...
    Rule Medium Severity
  • WA00555

    Group
  • WA00560

    Group
  • The URL-path name must be set to the file path name or the directory path name.

    The ScriptAlias directive controls which directories the Apache server "sees" as containing scripts. If the directive uses a URL-path name that is different than the actual file system path, the p...
    Rule Medium Severity
  • WA00515

    Group
  • Automatic directory indexing must be disabled.

    To identify the type of web servers and versions software installed it is common for attackers to scan for icons or special content specific to the server type and version. A simple request like ht...
    Rule Medium Severity
  • WA00547

    Group
  • The ability to override the access configuration for the OS root directory must be disabled.

    The Apache OverRide directive allows for .htaccess files to be used to override much of the configuration, including authentication, handling of document types, auto generated indexes, access contr...
    Rule Medium Severity
  • WA00565

    Group
  • HTTP request methods must be limited.

    The HTTP 1.1 protocol supports several request methods which are rarely used and potentially high risk. For example, methods such as PUT and DELETE are rarely used and should be disabled in keeping...
    Rule Medium Severity
  • WG345

    Group
  • The web server service password(s) must be entrusted to the SA or Web Manager.

    Normally, a service account is established for the web server. This is because a privileged account is not desirable and the server is designed to run for long uninterrupted periods of time. The SA...
    Rule Medium Severity
  • A public web server, if hosted on the NIPRNet, must be isolated in an accredited DoD DMZ Extension.

    To minimize exposure of private assets to unnecessary risk by attackers, public web servers must be isolated from internal systems. Public web servers are by nature more vulnerable to attack from ...
    Rule Medium Severity
  • Administrators must be the only users allowed access to the directory tree, the shell, or other operating system functions and utilities.

    As a rule, accounts on a web server are to be kept to a minimum. Only administrators, web managers, developers, auditors, and web authors require accounts on the machine hosting the web server. Thi...
    Rule High Severity
  • Administrative users and groups that have access rights to the web server must be documented.

    There are typically several individuals and groups that are involved in running a production web site. In most cases, we can identify several types of users on a web server. These are the System Ad...
    Rule Low Severity
  • Web server system files must conform to minimum file permission requirements.

    This check verifies that the key web server system configuration files are owned by the SA or Web Manager controlled account. These same files which control the configuration of the web server, and...
    Rule Medium Severity
  • Wscript.exe and Cscript.exe must only be accessible by the SA and/or the web administrator.

    Windows Scripting Host (WSH) is installed under either a Typical or Custom installation option of a Microsoft Network Server. This technology permits the execution of powerful script files from the...
    Rule Medium Severity
  • Web server content and configuration files must be part of a routine backup program.

    Backing up web server data and web server application software after upgrades or maintenance ensures that recovery can be accomplished up to the current version. It also provides a means to determ...
    Rule Low Severity
  • The site software used with the web server must have all applicable security patches applied and documented.

    The IAVM process does not address all patches that have been identified for the host operating system or, in this case, the web server software environment. Many vendors have subscription services ...
    Rule Medium Severity
  • The web server, although started by superuser or privileged account, must run using a non-privileged account.

    Running the web server with excessive privileges presents an increased risk to the web server. In the event the web server’s services are compromised, the context by which the web server is running...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules