Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • WG520

    <GroupDescription></GroupDescription>
    Group
  • Web server and/or operating system information must be protected.

    &lt;VulnDiscussion&gt;The web server response header of an HTTP response can contain several fields of information including the requested HTML pag...
    Rule Low Severity
  • WA155

    <GroupDescription></GroupDescription>
    Group
  • Classified web servers will be afforded physical security commensurate with the classification of its content.

    &lt;VulnDiscussion&gt;When data of a classified nature is migrated to a web server, fundamental principles applicable to the safeguarding of classi...
    Rule High Severity
  • WA230

    <GroupDescription></GroupDescription>
    Group
  • The site software used with the web server must have all applicable security patches applied and documented.

    &lt;VulnDiscussion&gt;The IAVM process does not address all patches that have been identified for the host operating system or, in this case, the w...
    Rule Medium Severity
  • WG275

    <GroupDescription></GroupDescription>
    Group
  • The web server, although started by superuser or privileged account, must run using a non-privileged account.

    &lt;VulnDiscussion&gt;Running the web server with excessive privileges presents an increased risk to the web server. In the event the web server’s ...
    Rule Medium Severity
  • WG355

    <GroupDescription></GroupDescription>
    Group
  • A private web server’s list of CAs in a trust hierarchy must lead to an authorized DoD PKI Root CA.

    &lt;VulnDiscussion&gt;A PKI certificate is a digital identifier that establishes the identity of an individual or a platform. A server that has a c...
    Rule Medium Severity
  • WG385

    <GroupDescription></GroupDescription>
    Group
  • All web server documentation, sample code, example applications, and tutorials must be removed from a production web server.

    &lt;VulnDiscussion&gt;Web server documentation, sample code, example applications, and tutorials may be an exploitable threat to a web server. A pr...
    Rule High Severity
  • WG145

    <GroupDescription></GroupDescription>
    Group
  • The private web server must use an approved DoD certificate validation process.

    &lt;VulnDiscussion&gt;Without the use of a certificate validation process, the site is vulnerable to accepting certificates that have expired or ha...
    Rule Medium Severity
  • WG237

    <GroupDescription></GroupDescription>
    Group
  • Remote authors or content providers must have all files scanned for malware before uploading files to the Document Root directory.

    &lt;VulnDiscussion&gt;Remote web authors should not be able to upload files to the DocumentRoot directory structure without virus checking and chec...
    Rule Medium Severity
  • WA000-WWA020

    <GroupDescription></GroupDescription>
    Group
  • The Timeout directive must be properly set.

    &lt;VulnDiscussion&gt;These Timeout requirements are set to mitigate the effects of several types of denial of service attacks. Although there is s...
    Rule Medium Severity
  • WA000-WWA022

    <GroupDescription></GroupDescription>
    Group
  • The KeepAlive directive must be enabled.

    &lt;VulnDiscussion&gt;The KeepAlive extension to HTTP/1.0 and the persistent connection feature of HTTP/1.1 provide long lived HTTP sessions which ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules