Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000266-WSR-000159

    <GroupDescription></GroupDescription>
    Group
  • VAMI must not be configured to use "mod_status".

    &lt;VulnDiscussion&gt;Any application providing too much information in error logs and in administrative messages to the screen risks compromising ...
    Rule Medium Severity
  • SRG-APP-000266-WSR-000160

    <GroupDescription></GroupDescription>
    Group
  • VAMI must have debug logging disabled.

    &lt;VulnDiscussion&gt;Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information abou...
    Rule Medium Severity
  • SRG-APP-000435-WSR-000147

    <GroupDescription></GroupDescription>
    Group
  • VAMI must be protected from being stopped by a nonprivileged user.

    &lt;VulnDiscussion&gt;An attacker has at least two reasons to stop a web server. The first is to cause a denial of service, and the second is to pu...
    Rule Medium Severity
  • SRG-APP-000439-WSR-000156

    <GroupDescription></GroupDescription>
    Group
  • VAMI must implement Transport Layer Security (TLS) 1.2 exclusively.

    &lt;VulnDiscussion&gt;TLS is a required transmission protocol for a web server hosting controlled information. The use of TLS provides confidential...
    Rule Medium Severity
  • SRG-APP-000516-WSR-000174

    <GroupDescription></GroupDescription>
    Group
  • VAMI must force clients to select the most secure cipher.

    &lt;VulnDiscussion&gt;During a Transport Layer Security (TLS) session negotiation, when choosing a cipher during a handshake, normally the client'...
    Rule Medium Severity
  • SRG-APP-000516-WSR-000174

    <GroupDescription></GroupDescription>
    Group
  • VAMI must disable client-initiated Transport Layer Security (TLS) renegotiation.

    &lt;VulnDiscussion&gt;All versions of the Secure Sockets Layer (SSL) and TLS protocols (up to and including TLS 1.2) are vulnerable to a man-in-the...
    Rule Medium Severity
  • SRG-APP-000266-WSR-000159

    <GroupDescription></GroupDescription>
    Group
  • VAMI must be configured to hide the server type and version in client responses.

    &lt;VulnDiscussion&gt;Web servers will often display error messages to client users, displaying enough information to aid in the debugging of the e...
    Rule Medium Severity
  • SRG-APP-000179-WSR-000111

    <GroupDescription></GroupDescription>
    Group
  • VAMI must enable FIPS mode.

    &lt;VulnDiscussion&gt;Encryption is only as good as the encryption modules used. Unapproved cryptographic module algorithms cannot be verified and ...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules