I - Mission Critical Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000266-WSR-000159
<GroupDescription></GroupDescription>Group -
OHS must have the ServerSignature directive disabled.
<VulnDiscussion>Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information abou...Rule Medium Severity -
SRG-APP-000266-WSR-000159
<GroupDescription></GroupDescription>Group -
OHS must have the ServerTokens directive set to limit the response header.
<VulnDiscussion>Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information abou...Rule Low Severity -
SRG-APP-000266-WSR-000159
<GroupDescription></GroupDescription>Group -
OHS must have the Alias /error directive defined to reference the directory accompanying the ErrorDocument directives to minimize the identity of OHS, patches, loaded modules, and directory paths in warning and error messages displayed to clients.
<VulnDiscussion>Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information abou...Rule Medium Severity -
SRG-APP-000266-WSR-000159
<GroupDescription></GroupDescription>Group -
OHS must have the permissions set properly via the Directory directive accompanying the ErrorDocument directives to minimize improper access to the warning and error messages displayed to clients.
<VulnDiscussion>Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information abou...Rule Medium Severity -
SRG-APP-000266-WSR-000159
<GroupDescription></GroupDescription>Group -
OHS must have defined error pages for common error codes that minimize the identity of the web server, patches, loaded modules, and directory paths.
<VulnDiscussion>Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information abou...Rule Low Severity -
SRG-APP-000266-WSR-000159
<GroupDescription></GroupDescription>Group -
OHS must have production information removed from error documents to minimize the identity of OHS, patches, loaded modules, and directory paths in warning and error messages displayed to clients.
<VulnDiscussion>Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information abou...Rule Low Severity -
SRG-APP-000266-WSR-000160
<GroupDescription></GroupDescription>Group -
Debugging and trace information used to diagnose OHS must be disabled.
<VulnDiscussion>Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information abou...Rule Medium Severity -
SRG-APP-000516-WSR-000079
<GroupDescription></GroupDescription>Group -
OHS must capture, record, and log all content related to a user session.
<VulnDiscussion>A user session to a web server is in the context of a user accessing a hosted application that extends to any plug-ins/module...Rule Medium Severity -
SRG-APP-000416-WSR-000118
<GroupDescription></GroupDescription>Group -
OHS must have the LoadModule ossl_module directive enabled to implement required cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance when encrypting data that must be compartmentalized.
<VulnDiscussion>Cryptography is only as strong as the encryption modules/algorithms employed to encrypt the data. Use of weak or untested en...Rule High Severity -
SRG-APP-000416-WSR-000118
<GroupDescription></GroupDescription>Group -
OHS must have the SSLFIPS directive enabled to implement required cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance when encrypting data that must be compartmentalized.
<VulnDiscussion>Cryptography is only as strong as the encryption modules/algorithms employed to encrypt the data. Use of weak or untested en...Rule High Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.