Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • WG400

    Group
  • All interactive programs must be placed in a designated directory with appropriate permissions.

    CGI scripts represents one of the most common and exploitable means of compromising a web server. By definition, CGI are executable by the operating system of the host server. While access control ...
    Rule Medium Severity
  • WG410

    Group
  • Interactive scripts used on a web server must have proper access controls.

    The use of CGI scripts represent one of the most common and exploitable means of compromising a web server. By definition, CGI scripts are executable by the operating system of the host server. Whi...
    Rule Medium Severity
  • WG110

    Group
  • The number of allowed simultaneous requests must be set.

    Resource exhaustion can occur when an unlimited number of concurrent requests are allowed on a web site, facilitating a denial of service attack. Mitigating this kind of attack will include limitin...
    Rule Medium Severity
  • WG170

    Group
  • Each readable web document directory must contain either a default, home, index, or equivalent file.

    The goal is to completely control the web users experience in navigating any portion of the web document root directories. Ensuring all web content directories have indexing turned off or at least ...
    Rule Low Severity
  • WG230

    Group
  • Web server administration must be performed over a secure path or at the local console.

    Logging into a web server remotely using an unencrypted protocol or service when performing updates and maintenance is a major risk. Data, such as user account, is transmitted in plaintext and can...
    Rule High Severity
  • WG240

    Group
  • Logs of web server access and errors must be established and maintained.

    A major tool in exploring the web site use, attempted use, unusual conditions, and problems are reported in the access and error logs. In the event of a security incident, these logs can provide th...
    Rule Medium Severity
  • WG250

    Group
  • Log file access must be restricted to System Administrators, Web Administrators or Auditors.

    A major tool in exploring the web site use, attempted use, unusual conditions and problems are the access and error logs. In the event of a security incident, these logs can provide the SA and Web ...
    Rule Medium Severity
  • WG260

    Group
  • Only web sites that have been fully reviewed and tested must exist on a production web server.

    In the case of a production web server, areas for content development and testing will not exist, as this type of content is only permissible on a development web site. The process of developing on...
    Rule Medium Severity
  • WG290

    Group
  • The web client account access to the content and scripts directories must be limited to read and execute.

    Excessive permissions for the anonymous web user account are one of the most common faults contributing to the compromise of a web server. If this user is able to upload and execute files on the we...
    Rule High Severity
  • WG310

    Group
  • A web site must not contain a robots.txt file.

    Search engines are constantly at work on the Internet. Search engines are augmented by agents, often referred to as spiders or bots, which endeavor to capture and catalog web-site content. In tur...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules