Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • WA000-WWA032

    <GroupDescription></GroupDescription>
    Group
  • The httpd.conf MaxClients directive must be set properly.

    &lt;VulnDiscussion&gt;These requirements are set to mitigate the effects of several types of denial of service attacks. Although there is some lati...
    Rule Medium Severity
  • WA000-WWA050

    <GroupDescription></GroupDescription>
    Group
  • All interactive programs must be placed in a designated directory with appropriate permissions.

    &lt;VulnDiscussion&gt;Directory options directives are directives that can be applied to further restrict access to file and directories. The Opti...
    Rule Medium Severity
  • WA000-WWA052

    <GroupDescription></GroupDescription>
    Group
  • The "–FollowSymLinks” setting must be disabled.

    &lt;VulnDiscussion&gt;The Options directive configures the web server features that are available in particular directories. The FollowSymLinks opt...
    Rule Medium Severity
  • WA000-WWA054

    <GroupDescription></GroupDescription>
    Group
  • Server side includes (SSIs) must run with execution capability disabled.

    &lt;VulnDiscussion&gt;The Options directive configures the web server features that are available in particular directories. The IncludesNOEXEC fe...
    Rule High Severity
  • WA000-WWA056

    <GroupDescription></GroupDescription>
    Group
  • The MultiViews directive must be disabled.

    &lt;VulnDiscussion&gt;Directory options directives are directives that can be applied to further restrict access to file and directories. MultiView...
    Rule Medium Severity
  • WA000-WWA058

    <GroupDescription></GroupDescription>
    Group
  • Directory indexing must be disabled on directories not containing index files.

    &lt;VulnDiscussion&gt;Directory options directives are directives that can be applied to further restrict access to file and directories. If a URL...
    Rule Medium Severity
  • WA000-WWA060

    <GroupDescription></GroupDescription>
    Group
  • The HTTP request message body size must be limited.

    &lt;VulnDiscussion&gt;Buffer overflow attacks are carried out by a malicious attacker sending amounts of data that the web server cannot store in a...
    Rule Medium Severity
  • WA000-WWA062

    <GroupDescription></GroupDescription>
    Group
  • The HTTP request header fields must be limited.

    &lt;VulnDiscussion&gt;Buffer overflow attacks are carried out by a malicious attacker sending amounts of data that the web server cannot store in a...
    Rule Medium Severity
  • WA000-WWA064

    <GroupDescription></GroupDescription>
    Group
  • The HTTP request header field size must be limited.

    &lt;VulnDiscussion&gt;Buffer overflow attacks are carried out by a malicious attacker sending amounts of data that the web server cannot store in a...
    Rule Medium Severity
  • WA000-WWA066

    <GroupDescription></GroupDescription>
    Group
  • The HTTP request line must be limited.

    &lt;VulnDiscussion&gt;Buffer overflow attacks are carried out by a malicious attacker sending amounts of data that the web server cannot store in a...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules