Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • WG385

    <GroupDescription></GroupDescription>
    Group
  • All web server documentation, sample code, example applications, and tutorials must be removed from a production web server.

    &lt;VulnDiscussion&gt;Web server documentation, sample code, example applications, and tutorials may be an exploitable threat to a web server. A pr...
    Rule High Severity
  • WG145

    <GroupDescription></GroupDescription>
    Group
  • The private web server must use an approved DoD certificate validation process.

    &lt;VulnDiscussion&gt;Without the use of a certificate validation process, the site is vulnerable to accepting certificates that have expired or ha...
    Rule Medium Severity
  • WG237

    <GroupDescription></GroupDescription>
    Group
  • Remote authors or content providers must have all files scanned for malware before uploading files to the Document Root directory.

    &lt;VulnDiscussion&gt;Remote web authors should not be able to upload files to the DocumentRoot directory structure without virus checking and chec...
    Rule Medium Severity
  • WA000-WWA020

    <GroupDescription></GroupDescription>
    Group
  • The Timeout directive must be properly set.

    &lt;VulnDiscussion&gt;These Timeout requirements are set to mitigate the effects of several types of denial of service attacks. Although there is s...
    Rule Medium Severity
  • WA000-WWA022

    <GroupDescription></GroupDescription>
    Group
  • The KeepAlive directive must be enabled.

    &lt;VulnDiscussion&gt;The KeepAlive extension to HTTP/1.0 and the persistent connection feature of HTTP/1.1 provide long lived HTTP sessions which ...
    Rule Medium Severity
  • WA000-WWA024

    <GroupDescription></GroupDescription>
    Group
  • The KeepAliveTimeout directive must be defined.

    &lt;VulnDiscussion&gt;The number of seconds Apache will wait for a subsequent request before closing the connection. Once a request has been receiv...
    Rule Medium Severity
  • WA000-WWA050

    <GroupDescription></GroupDescription>
    Group
  • All interactive programs must be placed in a designated directory with appropriate permissions.

    &lt;VulnDiscussion&gt;CGI scripts are one of the most exploited vulnerabilities on web servers. CGI script execution in Apache can be accomplished...
    Rule Medium Severity
  • WA000-WWA052

    <GroupDescription></GroupDescription>
    Group
  • The FollowSymLinks setting must be disabled.

    &lt;VulnDiscussion&gt;The Options directive configures the web server features that are available in particular directories. The FollowSymLinks opt...
    Rule Medium Severity
  • WA000-WWA054

    <GroupDescription></GroupDescription>
    Group
  • Server side includes (SSIs) must run with execution capability disabled.

    &lt;VulnDiscussion&gt;The Options directive configures the web server features that are available in particular directories. The IncludesNOEXEC fe...
    Rule High Severity
  • WA000-WWA056

    <GroupDescription></GroupDescription>
    Group
  • The MultiViews directive must be disabled.

    &lt;VulnDiscussion&gt;Apache HTTPD supports content negotiation as described in the HTTP/1.1 specification. It can choose the best representation o...
    Rule Medium Severity
  • WA000-WWA058

    <GroupDescription></GroupDescription>
    Group
  • Directory indexing must be disabled on directories not containing index files.

    &lt;VulnDiscussion&gt;Directory options directives are directives that can be applied to further restrict access to file and directories. If a URL...
    Rule Medium Severity
  • WA000-WWA060

    <GroupDescription></GroupDescription>
    Group
  • The HTTP request message body size must be limited.

    &lt;VulnDiscussion&gt;Buffer overflow attacks are carried out by a malicious attacker sending amounts of data that the web server cannot store in a...
    Rule Medium Severity
  • WA000-WWA062

    <GroupDescription></GroupDescription>
    Group
  • The HTTP request header fields must be limited.

    &lt;VulnDiscussion&gt;Buffer overflow attacks are carried out by a malicious attacker sending amounts of data that the web server cannot store in a...
    Rule Medium Severity
  • WA000-WWA064

    <GroupDescription></GroupDescription>
    Group
  • The HTTP request header field size must be limited.

    &lt;VulnDiscussion&gt;Buffer overflow attacks are carried out by a malicious attacker sending amounts of data that the web server cannot store in a...
    Rule Medium Severity
  • WA000-WWA066

    <GroupDescription></GroupDescription>
    Group
  • The HTTP request line must be limited.

    &lt;VulnDiscussion&gt;Buffer overflow attacks are carried out by a malicious attacker sending amounts of data that the web server cannot store in a...
    Rule Medium Severity
  • WA00500

    <GroupDescription></GroupDescription>
    Group
  • Active software modules must be minimized.

    &lt;VulnDiscussion&gt;Modules are the source of Apache httpd servers core and dynamic capabilities. Thus not every module available is needed for o...
    Rule Medium Severity
  • WA00505

    <GroupDescription></GroupDescription>
    Group
  • Web Distributed Authoring and Versioning (WebDAV) must be disabled.

    &lt;VulnDiscussion&gt;The Apache mod_dav and mod_dav_fs modules support WebDAV ('Web-based Distributed Authoring and Versioning') functionality for...
    Rule Medium Severity
  • WA00510

    <GroupDescription></GroupDescription>
    Group
  • Web server status module must be disabled.

    &lt;VulnDiscussion&gt;The Apache mod_info module provides information on the server configuration via access to a /server-info URL location, while ...
    Rule Medium Severity
  • WA00520

    <GroupDescription></GroupDescription>
    Group
  • The web server must not be configured as a proxy server.

    &lt;VulnDiscussion&gt;The Apache proxy modules allow the server to act as a proxy (either forward or reverse proxy) of http and other protocols wit...
    Rule Medium Severity
  • WA00525

    <GroupDescription></GroupDescription>
    Group
  • User specific directories must not be globally enabled.

    &lt;VulnDiscussion&gt;The UserDir directive must be disabled so that user home directories are not accessed via the web site with a tilde (~) prece...
    Rule Medium Severity
  • WA00530

    <GroupDescription></GroupDescription>
    Group
  • The process ID (PID) file must be properly secured.

    &lt;VulnDiscussion&gt;The PidFile directive sets the path to the process ID file to which the server records the process ID of the server, which is...
    Rule Medium Severity
  • WA00535

    <GroupDescription></GroupDescription>
    Group
  • The ScoreBoard file must be properly secured.

    &lt;VulnDiscussion&gt;The ScoreBoardFile directive sets a file path which the server will use for Inter-Process Communication (IPC) among the Apach...
    Rule Medium Severity
  • WA00540

    <GroupDescription></GroupDescription>
    Group
  • The web server must be configured to explicitly deny access to the OS root.

    &lt;VulnDiscussion&gt;The Apache Directory directive allows for directory specific configuration of access controls and many other features and opt...
    Rule Medium Severity
  • WA00545

    <GroupDescription></GroupDescription>
    Group
  • Web server options for the OS root must be disabled.

    &lt;VulnDiscussion&gt;The Apache Options directive allows for specific configuration of options, including execution of CGI, following symbolic lin...
    Rule Medium Severity
  • WA00550

    <GroupDescription></GroupDescription>
    Group
  • The TRACE method must be disabled.

    &lt;VulnDiscussion&gt; Use the Apache TraceEnable directive to disable the HTTP TRACE request method. Refer to the Apache documentation for more de...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules