Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000001-WSR-000001

    <GroupDescription></GroupDescription>
    Group
  • VAMI must limit the number of simultaneous requests.

    &lt;VulnDiscussion&gt;Denial of service (DoS) is one threat against web servers. Many DoS attacks attempt to consume web server resources in such a...
    Rule Medium Severity
  • SRG-APP-000014-WSR-000006

    <GroupDescription></GroupDescription>
    Group
  • VAMI must be configured with FIPS 140-2 compliant ciphers for HTTPS connections.

    &lt;VulnDiscussion&gt;Encryption of data in flight is an essential element of protecting information confidentiality. If a web server uses weak or ...
    Rule High Severity
  • SRG-APP-000015-WSR-000014

    <GroupDescription></GroupDescription>
    Group
  • VAMI must use cryptography to protect the integrity of remote sessions.

    &lt;VulnDiscussion&gt;Data exchanged between the user and the web server can range from static display data to credentials used to log in the hoste...
    Rule Medium Severity
  • SRG-APP-000016-WSR-000005

    <GroupDescription></GroupDescription>
    Group
  • VAMI must be configured to monitor remote access.

    &lt;VulnDiscussion&gt;Remote access can be exploited by an attacker to compromise the server. By recording all remote access activities, it will be...
    Rule Medium Severity
  • SRG-APP-000089-WSR-000047

    <GroupDescription></GroupDescription>
    Group
  • VAMI must generate log records for system startup and shutdown.

    &lt;VulnDiscussion&gt;Logging must be started as soon as possible when a service starts and when a service is stopped. Many forms of suspicious act...
    Rule Medium Severity
  • SRG-APP-000095-WSR-000056

    <GroupDescription></GroupDescription>
    Group
  • VAMI must produce log records containing sufficient information to establish what type of events occurred.

    &lt;VulnDiscussion&gt;After a security incident has occurred, investigators will often review log files to determine what happened. Understanding w...
    Rule Medium Severity
  • SRG-APP-000118-WSR-000068

    <GroupDescription></GroupDescription>
    Group
  • VAMI log files must only be accessible by privileged users.

    &lt;VulnDiscussion&gt;Log data is essential in the investigation of events. If log data were to become compromised, competent forensic analysis and...
    Rule Medium Severity
  • SRG-APP-000125-WSR-000071

    <GroupDescription></GroupDescription>
    Group
  • The rsyslog must be configured to monitor VAMI logs.

    &lt;VulnDiscussion&gt;For performance reasons, rsyslog file monitoring is preferred over configuring VAMI to send events to a syslog facility. With...
    Rule Medium Severity
  • SRG-APP-000131-WSR-000051

    <GroupDescription></GroupDescription>
    Group
  • VAMI server binaries and libraries must be verified for their integrity.

    &lt;VulnDiscussion&gt;Being able to verify that a patch, upgrade, certificate, etc., being added to the web server is unchanged from the producer o...
    Rule Medium Severity
  • SRG-APP-000141-WSR-000075

    <GroupDescription></GroupDescription>
    Group
  • VAMI must only load allowed server modules.

    &lt;VulnDiscussion&gt;A web server can provide many features, services, and processes. Some of these may be deemed unnecessary or too unsecure to r...
    Rule Medium Severity
  • SRG-APP-000141-WSR-000081

    <GroupDescription></GroupDescription>
    Group
  • VAMI must have Multipurpose Internet Mail Extensions (MIME) that invoke operating system shell programs disabled.

    &lt;VulnDiscussion&gt;Controlling what a user of a hosted application can access is part of the security posture of the web server. Any time a user...
    Rule Medium Severity
  • SRG-APP-000141-WSR-000081

    <GroupDescription></GroupDescription>
    Group
  • VAMI must explicitly disable Multipurpose Internet Mail Extensions (MIME) mime mappings based on "Content-Type".

    &lt;VulnDiscussion&gt;Controlling what a user of a hosted application can access is part of the security posture of the web server. Any time a user...
    Rule Medium Severity
  • SRG-APP-000141-WSR-000082

    <GroupDescription></GroupDescription>
    Group
  • VAMI must remove all mappings to unused scripts.

    &lt;VulnDiscussion&gt;Scripts allow server-side processing on behalf of the hosted application user or as processes needed in the implementation of...
    Rule Medium Severity
  • SRG-APP-000141-WSR-000083

    <GroupDescription></GroupDescription>
    Group
  • VAMI must have resource mappings set to disable the serving of certain file types.

    &lt;VulnDiscussion&gt;Resource mapping is the process of tying a particular file type to a process in the web server that can serve that type of fi...
    Rule Medium Severity
  • SRG-APP-000141-WSR-000085

    <GroupDescription></GroupDescription>
    Group
  • VAMI must not have the Web Distributed Authoring (WebDAV) servlet installed.

    &lt;VulnDiscussion&gt;A web server can be installed with functionality that, by its nature, is not secure. WebDAV is an extension to the HTTP proto...
    Rule Medium Severity
  • SRG-APP-000141-WSR-000086

    <GroupDescription></GroupDescription>
    Group
  • VAMI must prevent hosted applications from exhausting system resources.

    &lt;VulnDiscussion&gt;Most of the attention to denial-of-service (DoS) attacks focuses on ensuring that systems and applications are not victims of...
    Rule Medium Severity
  • SRG-APP-000176-WSR-000096

    <GroupDescription></GroupDescription>
    Group
  • VAMI must protect the keystore from unauthorized access.

    &lt;VulnDiscussion&gt;The web server's private key is used to prove the identity of the server to clients and securely exchange the shared secret k...
    Rule Medium Severity
  • SRG-APP-000246-WSR-000149

    <GroupDescription></GroupDescription>
    Group
  • VAMI must protect against or limit the effects of HTTP types of denial-of-service (DoS) attacks.

    &lt;VulnDiscussion&gt;In UNIX and related computer operating systems, a file descriptor is an indicator used to access a file or other input/output...
    Rule Medium Severity
  • SRG-APP-000251-WSR-000157

    <GroupDescription></GroupDescription>
    Group
  • VAMI must set the encoding for all text Multipurpose Internet Mail Extensions (MIME) types to UTF-8.

    &lt;VulnDiscussion&gt;Invalid user input occurs when a user inserts data or characters into a hosted application's data entry field and the hosted ...
    Rule Medium Severity
  • SRG-APP-000266-WSR-000142

    <GroupDescription></GroupDescription>
    Group
  • VAMI must disable directory browsing.

    &lt;VulnDiscussion&gt;The goal is to completely control the web user's experience in navigating any portion of the web document root directories. E...
    Rule Medium Severity
  • SRG-APP-000266-WSR-000159

    <GroupDescription></GroupDescription>
    Group
  • VAMI must not be configured to use "mod_status".

    &lt;VulnDiscussion&gt;Any application providing too much information in error logs and in administrative messages to the screen risks compromising ...
    Rule Medium Severity
  • SRG-APP-000266-WSR-000160

    <GroupDescription></GroupDescription>
    Group
  • VAMI must have debug logging disabled.

    &lt;VulnDiscussion&gt;Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information abou...
    Rule Medium Severity
  • SRG-APP-000435-WSR-000147

    <GroupDescription></GroupDescription>
    Group
  • VAMI must be protected from being stopped by a nonprivileged user.

    &lt;VulnDiscussion&gt;An attacker has at least two reasons to stop a web server. The first is to cause a denial of service, and the second is to pu...
    Rule Medium Severity
  • SRG-APP-000439-WSR-000156

    <GroupDescription></GroupDescription>
    Group
  • VAMI must implement Transport Layer Security (TLS) 1.2 exclusively.

    &lt;VulnDiscussion&gt;TLS is a required transmission protocol for a web server hosting controlled information. The use of TLS provides confidential...
    Rule Medium Severity
  • SRG-APP-000516-WSR-000174

    <GroupDescription></GroupDescription>
    Group
  • VAMI must force clients to select the most secure cipher.

    &lt;VulnDiscussion&gt;During a Transport Layer Security (TLS) session negotiation, when choosing a cipher during a handshake, normally the client'...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules