I - Mission Critical Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000295-WSR-000134
<GroupDescription></GroupDescription>Group -
The Apache web server must set an inactive timeout for completing the TLS handshake.
<VulnDiscussion>Leaving sessions open indefinitely is a major security risk. An attacker can easily use an already authenticated session to a...Rule Medium Severity -
SRG-APP-000315-WSR-000004
<GroupDescription></GroupDescription>Group -
The Apache web server must restrict inbound connections from nonsecure zones.
<VulnDiscussion>Remote access to the web server is any access that communicates through an external, non-organization-controlled network. Rem...Rule Medium Severity -
SRG-APP-000340-WSR-000029
<GroupDescription></GroupDescription>Group -
Non-privileged accounts on the hosting system must only access Apache web server security-relevant information and functions through a distinct administrative account.
<VulnDiscussion>By separating web server security functions from non-privileged users, roles can be developed that can then be used to admini...Rule Medium Severity -
SRG-APP-000383-WSR-000175
<GroupDescription></GroupDescription>Group -
The Apache web server must prohibit or restrict the use of nonsecure or unnecessary ports, protocols, modules, and/or services.
<VulnDiscussion>Web servers provide numerous processes, features, and functionalities that use TCP/IP ports. Some of these processes may be d...Rule Medium Severity -
SRG-APP-000427-WSR-000186
<GroupDescription></GroupDescription>Group -
The Apache web server must only accept client certificates issued by DoD PKI or DoD-approved PKI Certification Authorities (CAs).
<VulnDiscussion>Non-DoD-approved PKIs have not been evaluated to ensure that they have security controls and identity vetting procedures in p...Rule Medium Severity -
SRG-APP-000435-WSR-000148
<GroupDescription></GroupDescription>Group -
The Apache web server must be tuned to handle the operational requirements of the hosted application.
<VulnDiscussion>A denial of service (DoS) can occur when the web server is so overwhelmed that it can no longer respond to additional request...Rule Medium Severity -
SRG-APP-000439-WSR-000153
<GroupDescription></GroupDescription>Group -
The Apache web server cookies, such as session cookies, sent to the client using SSL/TLS must not be compressed.
<VulnDiscussion>A cookie is used when a web server needs to share data with the client's browser. The data is often used to remember the clie...Rule Medium Severity -
SRG-APP-000439-WSR-000154
<GroupDescription></GroupDescription>Group -
Cookies exchanged between the Apache web server and the client, such as session cookies, must have cookie properties set to prohibit client-side scripts from reading the cookie data.
<VulnDiscussion>A cookie can be read by client-side scripts easily if cookie properties are not set properly. By allowing cookies to be read ...Rule Medium Severity -
SRG-APP-000439-WSR-000155
<GroupDescription></GroupDescription>Group -
Cookies exchanged between the Apache web server and the client, such as session cookies, must have cookie properties set to force the encryption of cookies.
<VulnDiscussion>Cookies can be sent to a client using TLS/SSL to encrypt the cookies, but TLS/SSL is not used by every hosted application sin...Rule Medium Severity -
SRG-APP-000014-WSR-000006
<GroupDescription></GroupDescription>Group -
An Apache web server must maintain the confidentiality of controlled information during transmission through the use of an approved TLS version.
<VulnDiscussion>Transport Layer Security (TLS) is a required transmission protocol for a web server hosting controlled information. The use o...Rule High Severity -
SRG-APP-000516-WSR-000174
<GroupDescription></GroupDescription>Group -
The Apache web server must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
<VulnDiscussion>Configuring the web server to implement organization-wide security implementation guides and security checklists guarantees c...Rule Low Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.