No profile (default benchmark)
Rules and Groups employed by this XCCDF Profile
-
WG255
Group -
Access to the web server log files must be restricted to Administrators, the user assigned to run the web server software, Web Manager, and Auditors.
A major tool in exploring the web site use, attempted use, unusual conditions and problems are the access and error logs. In the event of a security incident, these logs can provide the SA and Web ...Rule Medium Severity -
WG342
Group -
Public web servers must use TLS if authentication is required.
Transport Layer Security (TLS) is optional for a public web server. However, if authentication is being performed, then the use of the TLS protocol is required. Without the use of TLS, the authen...Rule Medium Severity -
WG610
Group -
Web sites must utilize ports, protocols, and services according to PPSM guidelines.
Failure to comply with DoD ports, protocols, and services (PPS) requirements can result in compromise of enclave boundary protections and/or functionality of the automated information system (AIS)....Rule Low Severity -
WA00605
Group -
Error logging must be enabled.
The server error logs are invaluable because they can also be used to identify potential problems and enable proactive remediation. Log data can reveal anomalous behavior such as “not found” or “un...Rule Medium Severity -
WA00612
Group -
The sites error logs must log the correct format.
The server error logs are invaluable because they can also be used to identify potential problems and enable proactive remediation. Log data can reveal anomalous behavior such as “not found” or “u...Rule Medium Severity -
WA00615
Group -
System logging must be enabled.
The server error logs are invaluable because they can also be used to identify potential problems and enable proactive remediation. Log data can reveal anomalous behavior such as “not found” or “un...Rule Medium Severity -
WA00620
Group -
The LogLevel directive must be enabled.
The server error logs are invaluable because they can also be used to identify potential problems and enable proactive remediation. Log data can reveal anomalous behavior such as “not found” or “...Rule Medium Severity -
WG210
Group -
Web content directories must not be anonymously shared.
Sharing of web server content is a security risk when a web server is involved. Users accessing the share anonymously could experience privileged access to the content of such directories. Network ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.