Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000175-AS-000124

    <GroupDescription></GroupDescription>
    Group
  • DoD root CA certificates must be installed in Tomcat trust store.

    &lt;VulnDiscussion&gt;Tomcat truststores are used to validate client certificates. On the Ubuntu OS, by default Tomcat uses the "cacerts" file as ...
    Rule Medium Severity
  • SRG-APP-000176-AS-000125

    <GroupDescription></GroupDescription>
    Group
  • Keystore file must be protected.

    &lt;VulnDiscussion&gt;Keystore file contains authentication information used to access application data and data resources. Access to the file must...
    Rule Medium Severity
  • SRG-APP-000179-AS-000129

    <GroupDescription></GroupDescription>
    Group
  • Tomcat must use FIPS-validated ciphers on secured connectors.

    &lt;VulnDiscussion&gt;Connectors are how Tomcat receives requests over a network port, passes them to hosted web applications via HTTP or AJP, and ...
    Rule High Severity
  • SRG-APP-000211-AS-000146

    <GroupDescription></GroupDescription>
    Group
  • Access to JMX management interface must be restricted.

    &lt;VulnDiscussion&gt;Java Management Extensions (JMX) is used to provide programmatic access to Tomcat for management purposes. This includes moni...
    Rule Medium Severity
  • SRG-APP-000211-AS-000146

    <GroupDescription></GroupDescription>
    Group
  • Access to Tomcat manager application must be restricted.

    &lt;VulnDiscussion&gt;The Tomcat manager application is used to manage the Tomcat server and the applications that run on Tomcat. By default, the m...
    Rule Medium Severity
  • SRG-APP-000219-AS-000147

    <GroupDescription></GroupDescription>
    Group
  • Tomcat servers must mutually authenticate proxy or load balancer connections.

    &lt;VulnDiscussion&gt;Tomcat servers are often placed behind a proxy when exposed to both trusted and untrusted networks. This is done for security...
    Rule Medium Severity
  • SRG-APP-000223-AS-000150

    <GroupDescription></GroupDescription>
    Group
  • Tomcat must be configured to limit data exposure between applications.

    &lt;VulnDiscussion&gt;If RECYCLE_FACADES is true or if a security manager is in use, a new facade object will be created for each request. This red...
    Rule Low Severity
  • SRG-APP-000225-AS-000154

    <GroupDescription></GroupDescription>
    Group
  • Clusters must operate on a trusted network.

    &lt;VulnDiscussion&gt;Operating a Tomcat cluster on an untrusted network creates potential for unauthorized persons to view or manipulate cluster s...
    Rule Medium Severity
  • SRG-APP-000266-AS-000169

    <GroupDescription></GroupDescription>
    Group
  • ErrorReportValve showServerInfo must be set to false.

    &lt;VulnDiscussion&gt;The Error Report Valve is a simple error handler for HTTP status codes that will generate and return HTML error pages. It can...
    Rule Medium Severity
  • SRG-APP-000267-AS-000170

    <GroupDescription></GroupDescription>
    Group
  • Default error pages for manager application must be customized.

    &lt;VulnDiscussion&gt;Default error pages that accompany the manager application provide educational information on how to configure user accounts ...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules