Skip to content

APACHE 2.2 Server for Windows Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The TRACE method must be disabled.

    Use the Apache TraceEnable directive to disable the HTTP TRACE request method. Refer to the Apache documentation for more details http://httpd.apache.org/docs/2.2/mod/core.html#traceenable. The HT...
    Rule Medium Severity
  • WA00555

    Group
  • WA00560

    Group
  • The URL-path name must be set to the file path name or the directory path name.

    The ScriptAlias directive controls which directories the Apache server "sees" as containing scripts. If the directive uses a URL-path name that is different than the actual file system path, the p...
    Rule Medium Severity
  • WA00515

    Group
  • Automatic directory indexing must be disabled.

    To identify the type of web servers and versions software installed it is common for attackers to scan for icons or special content specific to the server type and version. A simple request like ht...
    Rule Medium Severity
  • WA00547

    Group
  • The ability to override the access configuration for the OS root directory must be disabled.

    The Apache OverRide directive allows for .htaccess files to be used to override much of the configuration, including authentication, handling of document types, auto generated indexes, access contr...
    Rule Medium Severity
  • WA00565

    Group
  • HTTP request methods must be limited.

    The HTTP 1.1 protocol supports several request methods which are rarely used and potentially high risk. For example, methods such as PUT and DELETE are rarely used and should be disabled in keeping...
    Rule Medium Severity
  • WG345

    Group
  • The web server service password(s) must be entrusted to the SA or Web Manager.

    Normally, a service account is established for the web server. This is because a privileged account is not desirable and the server is designed to run for long uninterrupted periods of time. The SA...
    Rule Medium Severity
  • A public web server, if hosted on the NIPRNet, must be isolated in an accredited DoD DMZ Extension.

    To minimize exposure of private assets to unnecessary risk by attackers, public web servers must be isolated from internal systems. Public web servers are by nature more vulnerable to attack from ...
    Rule Medium Severity
  • Administrators must be the only users allowed access to the directory tree, the shell, or other operating system functions and utilities.

    As a rule, accounts on a web server are to be kept to a minimum. Only administrators, web managers, developers, auditors, and web authors require accounts on the machine hosting the web server. Thi...
    Rule High Severity
  • Administrative users and groups that have access rights to the web server must be documented.

    There are typically several individuals and groups that are involved in running a production web site. In most cases, we can identify several types of users on a web server. These are the System Ad...
    Rule Low Severity
  • Web server system files must conform to minimum file permission requirements.

    This check verifies that the key web server system configuration files are owned by the SA or Web Manager controlled account. These same files which control the configuration of the web server, and...
    Rule Medium Severity
  • Wscript.exe and Cscript.exe must only be accessible by the SA and/or the web administrator.

    Windows Scripting Host (WSH) is installed under either a Typical or Custom installation option of a Microsoft Network Server. This technology permits the execution of powerful script files from the...
    Rule Medium Severity
  • Web server content and configuration files must be part of a routine backup program.

    Backing up web server data and web server application software after upgrades or maintenance ensures that recovery can be accomplished up to the current version. It also provides a means to determ...
    Rule Low Severity
  • The site software used with the web server must have all applicable security patches applied and documented.

    The IAVM process does not address all patches that have been identified for the host operating system or, in this case, the web server software environment. Many vendors have subscription services ...
    Rule Medium Severity
  • The web server, although started by superuser or privileged account, must run using a non-privileged account.

    Running the web server with excessive privileges presents an increased risk to the web server. In the event the web server’s services are compromised, the context by which the web server is running...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules