Apache Server 2.4 UNIX Site Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000223-WSR-000011
<GroupDescription></GroupDescription>Group -
Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application.
<VulnDiscussion>Cookies are used to exchange data between the web server and the client. Cookies, such as a session cookie, may contain sessi...Rule Medium Severity -
SRG-APP-000225-WSR-000074
<GroupDescription></GroupDescription>Group -
The Apache web server must augment re-creation to a stable and known baseline.
<VulnDiscussion>Making certain that the web server has not been updated by an unauthorized user is always a concern. Adding patches, function...Rule Medium Severity -
SRG-APP-000233-WSR-000146
<GroupDescription></GroupDescription>Group -
The Apache web server document directory must be in a separate partition from the Apache web servers system files.
<VulnDiscussion>A web server is used to deliver content on the request of a client. The content delivered to a client must be controlled, all...Rule Medium Severity -
SRG-APP-000246-WSR-000149
<GroupDescription></GroupDescription>Group -
The Apache web server must be tuned to handle the operational requirements of the hosted application.
<VulnDiscussion>A denial of service (DoS) can occur when the Apache web server is so overwhelmed that it can no longer respond to additional ...Rule Medium Severity -
SRG-APP-000266-WSR-000142
<GroupDescription></GroupDescription>Group -
The Apache web server must display a default hosted application web page, not a directory listing, when a requested web page cannot be found.
<VulnDiscussion>The goal is to completely control the web user's experience in navigating any portion of the web document root directories. E...Rule Medium Severity -
SRG-APP-000266-WSR-000159
<GroupDescription></GroupDescription>Group -
Warning and error messages displayed to clients must be modified to minimize the identity of the Apache web server, patches, loaded modules, and directory paths.
<VulnDiscussion>Information needed by an attacker to begin looking for possible vulnerabilities in an Apache web server includes any informat...Rule Medium Severity -
SRG-APP-000266-WSR-000160
<GroupDescription></GroupDescription>Group -
Debugging and trace information used to diagnose the Apache web server must be disabled.
<VulnDiscussion>Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information abou...Rule Medium Severity -
SRG-APP-000295-WSR-000012
<GroupDescription></GroupDescription>Group -
The Apache web server must set an absolute timeout for sessions.
<VulnDiscussion>Leaving sessions open indefinitely is a major security risk. An attacker can easily use an already authenticated session to a...Rule Medium Severity -
SRG-APP-000295-WSR-000134
<GroupDescription></GroupDescription>Group -
The Apache web server must set an inactive timeout for sessions.
<VulnDiscussion>Leaving sessions open indefinitely is a major security risk. An attacker can easily use an already authenticated session to a...Rule Medium Severity -
SRG-APP-000315-WSR-000004
<GroupDescription></GroupDescription>Group -
The Apache web server must restrict inbound connections from nonsecure zones.
<VulnDiscussion>Remote access to the Apache web server is any access that communicates through an external, non-organization-controlled netwo...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.