I - Mission Critical Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000001-AS-000001
Group -
The number of allowed simultaneous sessions to the manager application must be limited.
The manager application provides configuration access to the Tomcat server. Access to the manager application must be limited and that includes the number of sessions allowed to access the manageme...Rule Low Severity -
SRG-APP-000014-AS-000009
Group -
Secured connectors must be configured to use strong encryption ciphers.
The Tomcat <Connector> element controls the TLS protocol and the associated ciphers used. If a strong cipher is not selected, an attacker may be able to circumvent encryption protections that are c...Rule Medium Severity -
SRG-APP-000015-AS-000010
Group -
HTTP Strict Transport Security (HSTS) must be enabled.
HTTP Strict Transport Security (HSTS) instructs web browsers to only use secure connections for all future requests when communicating with a website. Doing so helps prevent SSL protocol attacks, S...Rule Low Severity -
SRG-APP-000015-AS-000010
Group -
TLS 1.2 must be used on secured HTTP connectors.
Using older versions of TLS introduces security vulnerabilities that exist in the older versions of the protocol. Tomcat by default will use all available versions of the SSL/TLS protocols unless t...Rule Medium Severity -
SRG-APP-000016-AS-000013
Group -
AccessLogValve must be configured for each application context.
Tomcat has the ability to host multiple contexts (applications) on one physical server by using the <Host><Context> attribute. This allows the admin to specify audit log settings on a per applicati...Rule Medium Severity -
SRG-APP-000033-AS-000024
Group -
Default password for keystore must be changed.
Tomcat currently operates only on JKS, PKCS11, or PKCS12 format keystores. The JKS format is Java's standard "Java KeyStore" format, and is the format created by the keytool command-line utility wh...Rule High Severity -
SRG-APP-000033-AS-000024
Group -
Cookies must have secure flag set.
It is possible to steal or manipulate web application session and cookies without having a secure cookie. Configuring the secure flag injects the setting into the response header. The $CATALINA_BA...Rule Medium Severity -
SRG-APP-000033-AS-000024
Group -
Cookies must have http-only flag set.
It is possible to steal or manipulate web application session and cookies without having a secure cookie. Configuring the secure flag injects the setting into the response header. The $CATALINA_BA...Rule Medium Severity -
SRG-APP-000033-AS-000024
Group -
DefaultServlet must be set to readonly for PUT and DELETE.
The DefaultServlet is a servlet provided with Tomcat. It is called when no other suitable page can be displayed to the client. The DefaultServlet serves static resources as well as directory listin...Rule Medium Severity -
SRG-APP-000033-AS-000024
Group -
Connectors must be secured.
The unencrypted HTTP protocol does not protect data from interception or alteration which can subject users to eavesdropping, tracking, and the modification of received data. To secure an HTTP conn...Rule Medium Severity -
SRG-APP-000033-AS-000024
Group -
The Java Security Manager must be enabled.
The Java Security Manager (JSM) is what protects the Tomcat server from trojan servlets, JSPs, JSP beans, tag libraries, or even from inadvertent mistakes. The JSM works the same way a client's web...Rule Medium Severity -
SRG-APP-000089-AS-000050
Group -
Tomcat servers behind a proxy or load balancer must log client IP.
When running Tomcat behind a load balancer or proxy, default behavior is for Tomcat to log the proxy or load balancer IP address as the client IP. Desired behavior is to log the actual client IP ra...Rule Medium Severity -
SRG-APP-000090-AS-000051
Group -
AccessLogValve must be configured per each virtual host.
Application servers utilize role-based access controls in order to specify the individuals who are allowed to configure application component loggable events. The application server must be configu...Rule Medium Severity -
SRG-APP-000096-AS-000059
Group -
Date and time of events must be logged.
The access logfile format is defined within a Valve that implements the org.apache.catalina.valves.AccessLogValve interface within the /opt/tomcat/server.xml configuration file: The %t pattern code...Rule Medium Severity -
SRG-APP-000097-AS-000060
Group -
Remote hostname must be logged.
The access logfile format is defined within a Valve that implements the org.apache.catalina.valves.AccessLogValve interface within the /opt/tomcat/server.xml configuration file: The %h pattern code...Rule Medium Severity -
SRG-APP-000097-AS-000060
Group -
HTTP status code must be logged.
The access logfile format is defined within a Valve that implements the org.apache.catalina.valves.AccessLogValve interface within the /opt/tomcat/server.xml configuration file: The %s pattern code...Rule Low Severity -
SRG-APP-000097-AS-000060
Group -
The first line of request must be logged.
The access logfile format is defined within a Valve that implements the org.apache.catalina.valves.AccessLogValve interface within the /opt/tomcat/server.xml configuration file: The "%r" ...Rule Medium Severity -
SRG-APP-000118-AS-000078
Group -
$CATALINA_BASE/logs folder permissions must be set to 750.
Tomcat file permissions must be restricted. The standard configuration is to have all Tomcat files owned by root with group Tomcat. While root has read/write privileges, group only has read permiss...Rule Medium Severity -
SRG-APP-000118-AS-000078
Group -
Files in the $CATALINA_BASE/logs/ folder must have their permissions set to 640.
Tomcat file permissions must be restricted. The standard configuration is to have all Tomcat files owned by root with group Tomcat. While root has read/write privileges, group only has read permiss...Rule Medium Severity -
SRG-APP-000119-AS-000079
Group -
Files in the $CATALINA_BASE/conf/ folder must have their permissions set to 640.
Tomcat file permissions must be restricted. The standard configuration is to have all Tomcat files owned by root with group Tomcat. While root has read/write privileges, group only has read permiss...Rule Medium Severity -
SRG-APP-000119-AS-000079
Group -
$CATALINA_BASE/conf folder permissions must be set to 750.
Tomcat file permissions must be restricted. The standard configuration is to have all Tomcat files owned by root with group Tomcat. While root has read/write privileges, group only has read permiss...Rule Medium Severity -
SRG-APP-000120-AS-000080
Group -
Jar files in the $CATALINA_HOME/bin/ folder must have their permissions set to 640.
Tomcat's file permissions must be restricted. The standard configuration is to have all Tomcat files owned by root with the group Tomcat. While root has read/write privileges, tomcat group only has...Rule Medium Severity -
SRG-APP-000121-AS-000081
Group -
$CATALINA_HOME/bin folder permissions must be set to 750.
Tomcat file permissions must be restricted. The standard configuration is to have all Tomcat files owned by root with group Tomcat. While root has read/write privileges, group only has read permiss...Rule Medium Severity -
SRG-APP-000133-AS-000092
Group -
Tomcat user UMASK must be set to 0027.
For Unix-based systems, umask settings affect file creation permissions. If the permissions are too loose, newly created log files and applications could be accessible to unauthorized users via the...Rule Medium Severity -
SRG-APP-000141-AS-000095
Group -
Stack tracing must be disabled.
Stack tracing provides debugging information from the application call stacks when a runtime error is encountered. If stack tracing is left enabled, Tomcat will provide this call stack information ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.