APACHE 2.2 Site for Windows Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
WG210
Group -
Web content directories must not be anonymously shared.
Sharing of web server content is a security risk when a web server is involved. Users accessing the share anonymously could experience privileged access to the content of such directories. Network ...Rule Medium Severity -
Interactive scripts used on a web server must have proper access controls.
The use of CGI scripts represent one of the most common and exploitable means of compromising a web server. By definition, CGI scripts are executable by the operating system of the host server. Whi...Rule Medium Severity -
The number of allowed simultaneous requests must be set.
Resource exhaustion can occur when an unlimited number of concurrent requests are allowed on a web site, facilitating a denial of service attack. Mitigating this kind of attack will include limitin...Rule Medium Severity -
Each readable web document directory must contain either a default, home, index, or equivalent file.
The goal is to completely control the web users experience in navigating any portion of the web document root directories. Ensuring all web content directories have indexing turned off or at least ...Rule Low Severity -
Logs of web server access and errors must be established and maintained.
A major tool in exploring the web site use, attempted use, unusual conditions, and problems are reported in the access and error logs. In the event of a security incident, these logs can provide th...Rule Medium Severity -
Only web sites that have been fully reviewed and tested must exist on a production web server.
In the case of a production web server, areas for content development and testing will not exist, as this type of content is only permissible on a development web site. The process of developing on...Rule Medium Severity -
A web site must not contain a robots.txt file.
Search engines are constantly at work on the Internet. Search engines are augmented by agents, often referred to as spiders or bots, which endeavor to capture and catalog web-site content. In tur...Rule Medium Severity -
Java software on production web servers must be limited to class files and the JAVA virtual machine.
From the source code in a .java or a .jpp file, the Java compiler produces a binary file with an extension of .class. The .java or .jpp file would, therefore, reveal sensitive information regarding...Rule Low Severity -
PERL scripts must use the TAINT option.
PERL (Practical Extraction and Report Language) is an interpreted language optimized for scanning arbitrary text files, extracting information from those text files, and printing reports based on t...Rule Medium Severity -
Private web servers must require certificates issued from a DoD-authorized Certificate Authority.
Web sites requiring authentication within the DoD must utilize PKI as an authentication mechanism for web users. Information systems residing behind web servers requiring authorization based on ind...Rule Medium Severity -
Log file data must contain required data elements.
The use of log files is a critical component of the operation of the Information Systems (IS) used within the DoD, and they can provide invaluable assistance with regard to damage assessment, causa...Rule Medium Severity -
Public web servers must use TLS if authentication is required.
Transport Layer Security (TLS) is optional for a public web server. However, if authentication is being performed, then the use of the TLS protocol is required. Without the use of TLS, the authen...Rule Medium Severity -
Error logging must be enabled.
The server error logs are invaluable because they can also be used to identify potential problems and enable proactive remediation. Log data can reveal anomalous behavior such as “not found” or “un...Rule Medium Severity -
The sites error logs must log the correct format.
The server error logs are invaluable because they can also be used to identify potential problems and enable proactive remediation. Log data can reveal anomalous behavior such as “not found” or “u...Rule Medium Severity -
The web document (home) directory must be in a separate partition from the web server’s system files.
Application partitioning enables an additional security measure by securing user traffic under one security context, while managing system and application files under another. Web content is access...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.