Apache Server 2.4 Windows Site Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000233-WSR-000146
<GroupDescription></GroupDescription>Group -
The Apache web server document directory must be in a separate partition from the Apache web servers system files.
<VulnDiscussion>A web server is used to deliver content on the request of a client. The content delivered to a client must be controlled, all...Rule Medium Severity -
SRG-APP-000266-WSR-000142
<GroupDescription></GroupDescription>Group -
The Apache web server must display a default hosted application web page, not a directory listing, when a requested web page cannot be found.
<VulnDiscussion>The goal is to completely control the web user's experience in navigating any portion of the web document root directories. E...Rule Medium Severity -
SRG-APP-000266-WSR-000159
<GroupDescription></GroupDescription>Group -
Warning and error messages displayed to clients must be modified to minimize the identity of the Apache web server, patches, loaded modules, and directory paths.
<VulnDiscussion>Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information abou...Rule Medium Severity -
SRG-APP-000266-WSR-000160
<GroupDescription></GroupDescription>Group -
Debugging and trace information used to diagnose the Apache web server must be disabled.
<VulnDiscussion>Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information abou...Rule Medium Severity -
SRG-APP-000295-WSR-000012
<GroupDescription></GroupDescription>Group -
The Apache web server must set an absolute timeout for sessions.
<VulnDiscussion>Leaving sessions open indefinitely is a major security risk. An attacker can easily use an already authenticated session to a...Rule Medium Severity -
SRG-APP-000295-WSR-000134
<GroupDescription></GroupDescription>Group -
The Apache web server must be tuned to handle the operational requirements of the hosted application.
<VulnDiscussion>A denial of service (DoS) can occur when the web server is so overwhelmed that it can no longer respond to additional request...Rule Medium Severity -
SRG-APP-000439-WSR-000153
<GroupDescription></GroupDescription>Group -
The Apache web server must set an inactive timeout for completing the TLS handshake.
<VulnDiscussion>Leaving sessions open indefinitely is a major security risk. An attacker can easily use an already authenticated session to a...Rule Medium Severity -
SRG-APP-000315-WSR-000004
<GroupDescription></GroupDescription>Group -
The Apache web server must restrict inbound connections from nonsecure zones.
<VulnDiscussion>Remote access to the web server is any access that communicates through an external, non-organization-controlled network. Rem...Rule Medium Severity -
SRG-APP-000340-WSR-000029
<GroupDescription></GroupDescription>Group -
Non-privileged accounts on the hosting system must only access Apache web server security-relevant information and functions through a distinct administrative account.
<VulnDiscussion>By separating web server security functions from non-privileged users, roles can be developed that can then be used to admini...Rule Medium Severity -
SRG-APP-000383-WSR-000175
<GroupDescription></GroupDescription>Group -
The Apache web server must prohibit or restrict the use of nonsecure or unnecessary ports, protocols, modules, and/or services.
<VulnDiscussion>Web servers provide numerous processes, features, and functionalities that use TCP/IP ports. Some of these processes may be d...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.