Skip to content

II - Mission Support Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000001-AS-000001

    <GroupDescription></GroupDescription>
    Group
  • The number of allowed simultaneous sessions to the manager application must be limited.

    &lt;VulnDiscussion&gt;The manager application provides configuration access to the Tomcat server. Access to the manager application must be limited...
    Rule Low Severity
  • SRG-APP-000014-AS-000009

    <GroupDescription></GroupDescription>
    Group
  • Secured connectors must be configured to use strong encryption ciphers.

    &lt;VulnDiscussion&gt;The Tomcat &lt;Connector&gt; element controls the TLS protocol and the associated ciphers used. If a strong cipher is not sel...
    Rule Medium Severity
  • SRG-APP-000015-AS-000010

    <GroupDescription></GroupDescription>
    Group
  • HTTP Strict Transport Security (HSTS) must be enabled.

    &lt;VulnDiscussion&gt;HTTP Strict Transport Security (HSTS) instructs web browsers to only use secure connections for all future requests when comm...
    Rule Low Severity
  • SRG-APP-000015-AS-000010

    <GroupDescription></GroupDescription>
    Group
  • TLS 1.2 must be used on secured HTTP connectors.

    &lt;VulnDiscussion&gt;Using older versions of TLS introduces security vulnerabilities that exist in the older versions of the protocol. Tomcat by d...
    Rule Medium Severity
  • SRG-APP-000016-AS-000013

    <GroupDescription></GroupDescription>
    Group
  • AccessLogValve must be configured for each application context.

    &lt;VulnDiscussion&gt;Tomcat has the ability to host multiple contexts (applications) on one physical server by using the &lt;Host&gt;&lt;Context&g...
    Rule Medium Severity
  • SRG-APP-000033-AS-000024

    <GroupDescription></GroupDescription>
    Group
  • Default password for keystore must be changed.

    &lt;VulnDiscussion&gt;Tomcat currently operates only on JKS, PKCS11, or PKCS12 format keystores. The JKS format is Java's standard "Java KeyStore" ...
    Rule High Severity
  • SRG-APP-000033-AS-000024

    <GroupDescription></GroupDescription>
    Group
  • Cookies must have secure flag set.

    &lt;VulnDiscussion&gt;It is possible to steal or manipulate web application session and cookies without having a secure cookie. Configuring the sec...
    Rule Medium Severity
  • SRG-APP-000033-AS-000024

    <GroupDescription></GroupDescription>
    Group
  • Cookies must have http-only flag set.

    &lt;VulnDiscussion&gt;It is possible to steal or manipulate web application session and cookies without having a secure cookie. Configuring the sec...
    Rule Medium Severity
  • SRG-APP-000033-AS-000024

    <GroupDescription></GroupDescription>
    Group
  • DefaultServlet must be set to readonly for PUT and DELETE.

    &lt;VulnDiscussion&gt;The DefaultServlet is a servlet provided with Tomcat. It is called when no other suitable page can be displayed to the client...
    Rule Medium Severity
  • SRG-APP-000033-AS-000024

    <GroupDescription></GroupDescription>
    Group
  • Connectors must be secured.

    &lt;VulnDiscussion&gt;The unencrypted HTTP protocol does not protect data from interception or alteration which can subject users to eavesdropping,...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules