II - Mission Support Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000141-WSR-000075
Group -
If mod_plsql is not in use with OHS, OHS must have the include moduleconf/* directive disabled.
A web server can provide many features, services, and processes. Some of these may be deemed unnecessary or too unsecure to run on a production DoD system. The web server must provide the capabil...Rule Medium Severity -
SRG-APP-000172-WSR-000104
Group -
OHS must have the LoadModule ossl_module directive enabled to encrypt passwords during transmission.
Data used to authenticate, especially passwords, needs to be protected at all times, and encryption is the standard method for protecting authentication data during transmission. Data used to authe...Rule High Severity -
SRG-APP-000172-WSR-000104
Group -
OHS must use FIPS modules to encrypt passwords during transmission.
Data used to authenticate, especially passwords, needs to be protected at all times, and encryption is the standard method for protecting authentication data during transmission. Data used to authe...Rule High Severity -
SRG-APP-000172-WSR-000104
Group -
OHS must have the SSLEngine, SSLProtocol, and SSLWallet directives enabled and configured to encrypt passwords during transmission.
Data used to authenticate, especially passwords, needs to be protected at all times, and encryption is the standard method for protecting authentication data during transmission. Data used to authe...Rule High Severity -
SRG-APP-000172-WSR-000104
Group -
OHS must have the SSLCipherSuite directive enabled to encrypt passwords during transmission.
Data used to authenticate, especially passwords, needs to be protected at all times, and encryption is the standard method for protecting authentication data during transmission. Data used to authe...Rule High Severity -
SRG-APP-000175-WSR-000095
Group -
OHS must have the LoadModule ossl_module directive enabled to perform RFC 5280-compliant certification path validation.
A certificate's certification path is the path from the end entity certificate to a trusted root certification authority (CA). Certification path validation is necessary for a relying party to make...Rule Medium Severity -
SRG-APP-000175-WSR-000095
Group -
OHS must use FIPS modules to perform RFC 5280-compliant certification path validation.
A certificate's certification path is the path from the end entity certificate to a trusted root certification authority (CA). Certification path validation is necessary for a relying party to make...Rule Medium Severity -
SRG-APP-000175-WSR-000095
Group -
OHS must have the SSLEngine, SSLProtocol, and SSLWallet directives enabled and configured to perform RFC 5280-compliant certification path validation.
A certificate's certification path is the path from the end entity certificate to a trusted root certification authority (CA). Certification path validation is necessary for a relying party to make...Rule Medium Severity -
SRG-APP-000175-WSR-000095
Group -
OHS must have the SSLCipherSuite directive enabled to perform RFC 5280-compliant certification path validation.
A certificate's certification path is the path from the end entity certificate to a trusted root certification authority (CA). Certification path validation is necessary for a relying party to make...Rule Medium Severity -
SRG-APP-000175-WSR-000095
Group -
OHS must have the SSLVerifyClient directive set within each SSL-enabled VirtualHost directive to perform RFC 5280-compliant certification path validation.
A certificate's certification path is the path from the end entity certificate to a trusted root certification authority (CA). Certification path validation is necessary for a relying party to make...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.