II - Mission Support Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000516-WSR-000174
Group -
OHS must have the RewriteLogLevel directive set to the proper log level.
Logging must not contain sensitive information or more information necessary than that needed to administer the system. The log levels from the rewrite engine range from 0 to 9 where 0 is no loggi...Rule Low Severity -
SRG-APP-000516-WSR-000174
Group -
OHS must have the RewriteLog directive set properly.
Specifying where the log files are written gives the system administrator the capability to store the files in a location other than the default, with system files or in a globally accessible locat...Rule Low Severity -
SRG-APP-000516-WSR-000174
Group -
All accounts installed with the web server software and tools must have passwords assigned and default passwords changed.
During installation of the web server software, accounts are created for the web server to operate properly. The accounts installed can have either no password installed or a default password, whic...Rule Medium Severity -
SRG-APP-000516-WSR-000174
Group -
A production OHS Installation must prohibit the installation of a compiler.
The presence of a compiler on a production server facilitates the malicious user’s task of creating custom versions of programs and installing Trojan Horses or viruses. For example, the attacker’s...Rule Medium Severity -
SRG-APP-000516-WSR-000174
Group -
A public OHS installation, if hosted on the NIPRNet, must be isolated in an accredited DoD DMZ Extension.
To minimize exposure of private assets to unnecessary risk by attackers, public web servers must be isolated from internal systems. Public web servers are by nature more vulnerable to attack from ...Rule Medium Severity -
SRG-APP-000516-WSR-000174
Group -
A private OHS installation must be located on a separate controlled access subnet.
Private web servers, which host sites that serve controlled access data, must be protected from outside threats in addition to insider threats. Insider threat may be accidental or intentional but, ...Rule Medium Severity -
SRG-APP-000516-WSR-000174
Group -
The version of the OHS installation must be vendor-supported.
Many vulnerabilities are associated with older versions of software. As hot fixes and patches are issued, these solutions are included in the next version of the server software. Maintaining OHS ...Rule High Severity -
SRG-APP-000516-WSR-000174
Group -
OHS must be certified with accompanying Fusion Middleware products.
OHS is capable of being used with other Oracle products. For the products to work properly and not introduce vulnerabilities or errors, Oracle certifies which versions work with each other. Insis...Rule Medium Severity -
SRG-APP-000516-WSR-000174
Group -
OHS tools must be restricted to the web manager and the web managers designees.
All automated information systems are at risk of data loss due to disaster or compromise. Failure to provide adequate protection to the administration tools creates risk of potential theft or damag...Rule Medium Severity -
SRG-APP-000516-WSR-000174
Group -
All utility programs, not necessary for operations, must be removed or disabled.
Just as running unneeded services and protocols is a danger to the web server at the lower levels of the OSI model, running unneeded utilities and programs is also a danger at the application layer...Rule Low Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.