Skip to content

HTTP Strict Transport Security (HSTS) must be enabled.

An XCCDF Rule

Description

<VulnDiscussion>HTTP Strict Transport Security (HSTS) instructs web browsers to only use secure connections for all future requests when communicating with a website. Doing so helps prevent SSL protocol attacks, SSL stripping, cookie hijacking, and other attempts to circumvent SSL protection. Implementing HSTS requires testing of your web applications to ensure SSL certificates align correctly with application requirements and sub-domains if sub-domains are used. Ensure certificates are installed and working correctly. If sub-domains are in use, all sub-domains must be covered in the SSL/TLS certificate and the includeSubDomains directive must be specified in order for HSTS to function properly.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>

ID
SV-222928r918125_rule
Severity
Low
References
Updated



Remediation - Manual Procedure

From the Tomcat server as a privileged user, edit the web.xml file:

sudo nano $CATALINA_BASE/conf/web.xml file.

Uncomment the existing httpHeaderSecurity filter section or create the filter section using the following code: