Skip to content

Microsoft IIS 10.0 Site Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000246-WSR-000149

    Group
  • Unlisted file extensions in URL requests must be filtered by any IIS 10.0 website.

    Request filtering enables administrators to create a more granular rule set to allow or reject inbound web content. Setting limits on web requests helps to ensure availability of web services and m...
    Rule Medium Severity
  • SRG-APP-000251-WSR-000157

    Group
  • Directory Browsing on the IIS 10.0 website must be disabled.

    Directory browsing allows the contents of a directory to be displayed upon request from a web client. If directory browsing is enabled for a directory in IIS, users could receive a web page listing...
    Rule Medium Severity
  • SRG-APP-000266-WSR-000159

    Group
  • Warning and error messages displayed to clients must be modified to minimize the identity of the IIS 10.0 website, patches, loaded modules, and directory paths.

    HTTP error pages contain information that could enable an attacker to gain access to an information system. Failure to prevent the sending of HTTP error pages with full information to remote reques...
    Rule Medium Severity
  • SRG-APP-000266-WSR-000160

    Group
  • Debugging and trace information used to diagnose the IIS 10.0 website must be disabled.

    Setting compilation debug to false ensures detailed error information does not inadvertently display during live application usage, mitigating the risk of application information being displayed to...
    Rule Medium Severity
  • SRG-APP-000295-WSR-000012

    Group
  • The Idle Time-out monitor for each IIS 10.0 website must be enabled.

    The idle time-out attribute controls the amount of time a worker process will remain idle before it shuts down. A worker process is idle if it is not processing requests and no new requests are rec...
    Rule Medium Severity
  • SRG-APP-000295-WSR-000134

    Group
  • SRG-APP-000316-WSR-000170

    Group
  • SRG-APP-000357-WSR-000150

    Group
  • The IIS 10.0 website must use a logging mechanism configured to allocate log record storage capacity large enough to accommodate the logging requirements of the IIS 10.0 website.

    To make certain the logging mechanism used by the web server has sufficient storage capacity in which to write the logs, the logging mechanism must be able to allocate log record storage capacity. ...
    Rule Medium Severity
  • SRG-APP-000383-WSR-000175

    Group
  • The IIS 10.0 websites must use ports, protocols, and services according to Ports, Protocols, and Services Management (PPSM) guidelines.

    Web servers provide numerous processes, features, and functionalities that use TCP/IP ports. Some of these processes may be deemed unnecessary or too unsecure to run on a production system. The we...
    Rule Medium Severity
  • SRG-APP-000427-WSR-000186

    Group
  • The IIS 10.0 website must only accept client certificates issued by DoD PKI or DoD-approved PKI Certification Authorities (CAs).

    The use of a DoD PKI certificate ensures clients the private website they are connecting to is legitimate, and is an essential part of the DoD defense-in-depth strategy.
    Rule Medium Severity
  • SRG-APP-000429-WSR-000113

    Group
  • SRG-APP-000439-WSR-000152

    Group
  • IIS 10.0 website session IDs must be sent to the client using TLS.

    The HTTP protocol is a stateless protocol. To maintain a session, a session identifier is used. The session identifier is a piece of data used to identify a session and a user. If the session ident...
    Rule Medium Severity
  • SRG-APP-000439-WSR-000154

    Group
  • Cookies exchanged between the IIS 10.0 website and the client must have cookie properties set to prohibit client-side scripts from reading the cookie data.

    A cookie can be read by client-side scripts easily if cookie properties are not set properly. By allowing cookies to be read by the client-side scripts, information such as session identifiers coul...
    Rule Medium Severity
  • SRG-APP-000516-WSR-000174

    Group
  • The IIS 10.0 website must have a unique application pool.

    Application pools isolate sites and applications to address reliability, availability, and security issues. Sites and applications may be grouped according to configurations, although each site wil...
    Rule Medium Severity
  • SRG-APP-000516-WSR-000174

    Group
  • The maximum number of requests an application pool can process for each IIS 10.0 website must be explicitly set.

    IIS application pools can be periodically recycled to avoid unstable states possibly leading to application crashes, hangs, or memory leaks. By default, application pool recycling is overlapped, wh...
    Rule Medium Severity
  • SRG-APP-000516-WSR-000174

    Group
  • The application pool for each IIS 10.0 website must have a recycle time explicitly set.

    Application pools can be periodically recycled to avoid unstable states possibly leading to application crashes, hangs, or memory leaks.
    Rule Medium Severity
  • SRG-APP-000516-WSR-000174

    Group
  • SRG-APP-000516-WSR-000174

    Group
  • SRG-APP-000141-WSR-000087

    Group
  • Interactive scripts on the IIS 10.0 web server must be located in unique and designated folders.

    CGI and ASP scripts represent one of the most common and exploitable means of compromising a web server. All CGI and ASP program files must be segregated into their own unique folder to simplify th...
    Rule Medium Severity
  • SRG-APP-000141-WSR-000087

    Group
  • SRG-APP-000141-WSR-000087

    Group
  • Backup interactive scripts on the IIS 10.0 server must be removed.

    Copies of backup files will not execute on the server, but they can be read by the anonymous user if special precautions are not taken. Such backup copies contain the same sensitive information as ...
    Rule Medium Severity
  • SRG-APP-000516-WSR-000174

    Group
  • The required DoD banner page must be displayed to authenticated users accessing a DoD private website.

    A consent banner will be in place to inform prospective entrants the website they are about to enter is a DoD website and their activity is subject to monitoring. The document, DoDI 8500.01, establ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules