Red Hat Ansible Automation Controller Web Server Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The Automation Controller servers must use encrypted communication for all channels given the high impact of those services to an organization's infrastructure.
The Automation Controller communicates information about configuration of other information systems through its web interface and API, storing records about this information in a database. Although...Rule Medium Severity -
Expansion modules must be fully reviewed, tested, and signed before they can exist on a production Automation Controller NGINX front-end web server.
In the case of a production web server, areas for content development and testing will not exist, as this type of content is only permissible on a development website. The process of developing on...Rule Medium Severity -
All Automation Controller NGINX front-end web servers must not perform user management for hosted applications.
Web servers require enterprise-wide user management capability in order to prevent unauthorized access, with features like attempt lockouts and password complexity requirements. Unauthorized acces...Rule Medium Severity -
All Automation Controller NGINX web servers must have Web Distributed Authoring (WebDAV) disabled.
Automation Controller NGINX web servers can be installed with functionality that, just by its nature, is not secure. Web Distributed Authoring (WebDAV) is an extension to the HTTP protocol that, wh...Rule Medium Severity -
All Automation Controller NGINX web servers must be configured to use a specified IP address and port.
From a security perspective, it is important that all Automation Controller NGINX web servers are configured to use a specified IP address and port because “listening” on all IP addresses poses a v...Rule Medium Severity -
Cookies exchanged between any Automation Controller NGINX web server and any client, such as session cookies, must have security settings that disallow cookie access outside the originating Automation Controller NGINX web server and hosted application.
It is important that cookies exchanged between any Automation Controller NGINX webserver and any client have security settings that do not allow cookie access outside the originating Automation Con...Rule Medium Severity -
The Automation Controller NGINX web server must limit the character set used for data entry.
It is important that Automation Controller NGINX web server limit the character set used for data entry and disallow Unicode use in hosted applications to avoid application compromise. Definition o...Rule Medium Severity -
Debugging and trace information, within Automation Controller NGINX web server, used to diagnose the web server must be disabled.
It is important that Automation Controller NGINX web server debugging and trace information used to diagnose the web server is disabled, because debugging information can yield information about th...Rule Medium Severity -
The Automation Controller NGINX web server application, libraries, and configuration files must only be accessible to privileged users.
Automation Controller NGINX web servers can be modified through parameter modification, patch installation, upgrades to the web server or modules, and security parameter changes. With each of these...Rule Medium Severity -
The Automation Controller NGINX web server must employ cryptographic mechanisms (TLS/DTLS/SSL) to prevent the unauthorized disclosure of information during transmission.
Preventing the disclosure of transmitted information requires that the Automation Controller web server take measures to employ some form of cryptographic mechanism in order to protect the informat...Rule High Severity -
SRG-APP-000014-WSR-000006
Group -
SRG-APP-000001-WSR-000002
Group -
The Automation Controller web server must manage sessions.
Session management on client and server is required to protect identity and authorization information. Sessions for the Automation Controller web server, if compromised, could lead to execution of...Rule Medium Severity -
SRG-APP-000015-WSR-000014
Group -
The Automation Controller NGINX web server must use cryptography on all remote connections.
Nondisplayed data on a web page may expose information that could put the organization at risk and negatively affect data integrity. Automation Controller's web server must be configured such that...Rule Medium Severity -
SRG-APP-000016-WSR-000005
Group -
The Automation Controller must generate the appropriate log records.
Automation Controller's web server must log all details related to user sessions in support of troubleshooting, debugging, and forensic analysis. Without a data logging feature, the organization l...Rule Medium Severity -
SRG-APP-000131-WSR-000051
Group -
All Automation Controller NGINX front-end web server files must be verified for their integrity (e.g., checksums and hashes) before becoming part of the production web server.
Being able to verify that a patch, upgrade, certificate, etc., being added to the web server is unchanged from the producer of the file is essential for file validation and nonrepudiation of the in...Rule High Severity -
SRG-APP-000131-WSR-000073
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.