Skip to content

Apache Server 2.4 Windows Server Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000108-WSR-000166

    <GroupDescription></GroupDescription>
    Group
  • The Apache web server must use a logging mechanism that is configured to alert the (ISSO) and System Administrator (SA) in the event of a processing failure.

    &lt;VulnDiscussion&gt;Reviewing log data allows an investigator to recreate the path of an attacker and to capture forensic data for later use. Log...
    Rule Medium Severity
  • SRG-APP-000118-WSR-000068

    <GroupDescription></GroupDescription>
    Group
  • The Apache web server log files must only be accessible by privileged users.

    &lt;VulnDiscussion&gt;Log data is essential in the investigation of events. If log data were to become compromised, competent forensic analysis and...
    Rule Medium Severity
  • SRG-APP-000120-WSR-000070

    <GroupDescription></GroupDescription>
    Group
  • The Apache web server must not perform user management for hosted applications.

    &lt;VulnDiscussion&gt;User management and authentication can be an essential part of any application hosted by the web server. Along with authentic...
    Rule Medium Severity
  • SRG-APP-000141-WSR-000075

    <GroupDescription></GroupDescription>
    Group
  • The Apache web server must only contain services and functions necessary for operation.

    &lt;VulnDiscussion&gt;A web server can provide many features, services, and processes. Some of these may be deemed unnecessary or too unsecure to r...
    Rule Medium Severity
  • SRG-APP-000141-WSR-000076

    <GroupDescription></GroupDescription>
    Group
  • The Apache web server must not be a proxy server.

    &lt;VulnDiscussion&gt;A web server should be primarily a web server or a proxy server but not both, for the same reasons that other multi-use serve...
    Rule Medium Severity
  • SRG-APP-000141-WSR-000077

    <GroupDescription></GroupDescription>
    Group
  • The Apache web server must provide install options to exclude the installation of documentation, sample code, example applications, and tutorials.

    &lt;VulnDiscussion&gt;Web server documentation, sample code, example applications, and tutorials may be an exploitable threat to a web server becau...
    Rule High Severity
  • SRG-APP-000141-WSR-000078

    <GroupDescription></GroupDescription>
    Group
  • Apache web server application directories, libraries, and configuration files must only be accessible to privileged users.

    &lt;VulnDiscussion&gt;When accounts used for web server features such as documentation, sample code, example applications, tutorials, utilities, an...
    Rule High Severity
  • SRG-APP-000141-WSR-000081

    <GroupDescription></GroupDescription>
    Group
  • The Apache web server must have resource mappings set to disable the serving of certain file types.

    &lt;VulnDiscussion&gt;Resource mapping is the process of tying a particular file type to a process in the web server that can serve that type of fi...
    Rule Medium Severity
  • SRG-APP-000141-WSR-000082

    <GroupDescription></GroupDescription>
    Group
  • The Apache web server must allow the mappings to unused and vulnerable scripts to be removed.

    &lt;VulnDiscussion&gt;Scripts allow server-side processing on behalf of the hosted application user or as processes needed in the implementation of...
    Rule Medium Severity
  • SRG-APP-000141-WSR-000085

    <GroupDescription></GroupDescription>
    Group
  • The Apache web server must have Web Distributed Authoring (WebDAV) disabled.

    &lt;VulnDiscussion&gt;A web server can be installed with functionality that, just by its nature, is not secure. WebDAV is an extension to the HTTP ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules