Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • WG520

    Group
  • Web server and/or operating system information must be protected.

    The web server response header of an HTTP response can contain several fields of information including the requested HTML page. The information included in this response can be web server type and ...
    Rule Low Severity
  • WA155

    Group
  • Classified web servers will be afforded physical security commensurate with the classification of its content.

    When data of a classified nature is migrated to a web server, fundamental principles applicable to the safeguarding of classified material must be followed. A classified web server needs to be affo...
    Rule High Severity
  • WA230

    Group
  • The site software used with the web server must have all applicable security patches applied and documented.

    The IAVM process does not address all patches that have been identified for the host operating system or, in this case, the web server software environment. Many vendors have subscription services ...
    Rule Medium Severity
  • WG275

    Group
  • The web server, although started by superuser or privileged account, must run using a non-privileged account.

    Running the web server with excessive privileges presents an increased risk to the web server. In the event the web server’s services are compromised, the context by which the web server is running...
    Rule Medium Severity
  • WG355

    Group
  • A private web server’s list of CAs in a trust hierarchy must lead to an authorized DoD PKI Root CA.

    A PKI certificate is a digital identifier that establishes the identity of an individual or a platform. A server that has a certificate provides users with third-party confirmation of authenticity....
    Rule Medium Severity
  • WG385

    Group
  • All web server documentation, sample code, example applications, and tutorials must be removed from a production web server.

    Web server documentation, sample code, example applications, and tutorials may be an exploitable threat to a web server. A production web server may only contain components that are operationally n...
    Rule High Severity
  • WG145

    Group
  • The private web server must use an approved DoD certificate validation process.

    Without the use of a certificate validation process, the site is vulnerable to accepting certificates that have expired or have been revoked. This would allow unauthorized individuals access to the...
    Rule Medium Severity
  • WG237

    Group
  • Remote authors or content providers must have all files scanned for malware before uploading files to the Document Root directory.

    Remote web authors should not be able to upload files to the DocumentRoot directory structure without virus checking and checking for malicious or mobile code. A remote web user whose agency has a ...
    Rule Medium Severity
  • WA000-WWA020

    Group
  • The Timeout directive must be properly set.

    These Timeout requirements are set to mitigate the effects of several types of denial of service attacks. Although there is some latitude concerning the settings themselves, the requirements attemp...
    Rule Medium Severity
  • WA000-WWA022

    Group
  • The KeepAlive directive must be enabled.

    The KeepAlive extension to HTTP/1.0 and the persistent connection feature of HTTP/1.1 provide long lived HTTP sessions which allow multiple requests to be sent over the same connection. These requi...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules