Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000001-AS-000001

    <GroupDescription></GroupDescription>
    Group
  • The number of allowed simultaneous sessions to the manager application must be limited.

    &lt;VulnDiscussion&gt;The manager application provides configuration access to the Tomcat server. Access to the manager application must be limited...
    Rule Low Severity
  • SRG-APP-000014-AS-000009

    <GroupDescription></GroupDescription>
    Group
  • Secured connectors must be configured to use strong encryption ciphers.

    &lt;VulnDiscussion&gt;The Tomcat &lt;Connector&gt; element controls the TLS protocol and the associated ciphers used. If a strong cipher is not sel...
    Rule Medium Severity
  • SRG-APP-000015-AS-000010

    <GroupDescription></GroupDescription>
    Group
  • HTTP Strict Transport Security (HSTS) must be enabled.

    &lt;VulnDiscussion&gt;HTTP Strict Transport Security (HSTS) instructs web browsers to only use secure connections for all future requests when comm...
    Rule Low Severity
  • SRG-APP-000015-AS-000010

    <GroupDescription></GroupDescription>
    Group
  • TLS 1.2 must be used on secured HTTP connectors.

    &lt;VulnDiscussion&gt;Using older versions of TLS introduces security vulnerabilities that exist in the older versions of the protocol. Tomcat by d...
    Rule Medium Severity
  • SRG-APP-000016-AS-000013

    <GroupDescription></GroupDescription>
    Group
  • AccessLogValve must be configured for each application context.

    &lt;VulnDiscussion&gt;Tomcat has the ability to host multiple contexts (applications) on one physical server by using the &lt;Host&gt;&lt;Context&g...
    Rule Medium Severity
  • SRG-APP-000033-AS-000024

    <GroupDescription></GroupDescription>
    Group
  • Default password for keystore must be changed.

    &lt;VulnDiscussion&gt;Tomcat currently operates only on JKS, PKCS11, or PKCS12 format keystores. The JKS format is Java's standard "Java KeyStore" ...
    Rule High Severity
  • SRG-APP-000033-AS-000024

    <GroupDescription></GroupDescription>
    Group
  • Cookies must have secure flag set.

    &lt;VulnDiscussion&gt;It is possible to steal or manipulate web application session and cookies without having a secure cookie. Configuring the sec...
    Rule Medium Severity
  • SRG-APP-000033-AS-000024

    <GroupDescription></GroupDescription>
    Group
  • Cookies must have http-only flag set.

    &lt;VulnDiscussion&gt;It is possible to steal or manipulate web application session and cookies without having a secure cookie. Configuring the sec...
    Rule Medium Severity
  • SRG-APP-000033-AS-000024

    <GroupDescription></GroupDescription>
    Group
  • DefaultServlet must be set to readonly for PUT and DELETE.

    &lt;VulnDiscussion&gt;The DefaultServlet is a servlet provided with Tomcat. It is called when no other suitable page can be displayed to the client...
    Rule Medium Severity
  • SRG-APP-000033-AS-000024

    <GroupDescription></GroupDescription>
    Group
  • Connectors must be secured.

    &lt;VulnDiscussion&gt;The unencrypted HTTP protocol does not protect data from interception or alteration which can subject users to eavesdropping,...
    Rule Medium Severity
  • SRG-APP-000033-AS-000024

    <GroupDescription></GroupDescription>
    Group
  • The Java Security Manager must be enabled.

    &lt;VulnDiscussion&gt;The Java Security Manager (JSM) is what protects the Tomcat server from trojan servlets, JSPs, JSP beans, tag libraries, or e...
    Rule Medium Severity
  • SRG-APP-000089-AS-000050

    <GroupDescription></GroupDescription>
    Group
  • Tomcat servers behind a proxy or load balancer must log client IP.

    &lt;VulnDiscussion&gt;When running Tomcat behind a load balancer or proxy, default behavior is for Tomcat to log the proxy or load balancer IP addr...
    Rule Medium Severity
  • SRG-APP-000090-AS-000051

    <GroupDescription></GroupDescription>
    Group
  • AccessLogValve must be configured per each virtual host.

    &lt;VulnDiscussion&gt;Application servers utilize role-based access controls in order to specify the individuals who are allowed to configure appli...
    Rule Medium Severity
  • SRG-APP-000096-AS-000059

    <GroupDescription></GroupDescription>
    Group
  • Date and time of events must be logged.

    &lt;VulnDiscussion&gt;The access logfile format is defined within a Valve that implements the org.apache.catalina.valves.AccessLogValve interface w...
    Rule Medium Severity
  • SRG-APP-000097-AS-000060

    <GroupDescription></GroupDescription>
    Group
  • Remote hostname must be logged.

    &lt;VulnDiscussion&gt;The access logfile format is defined within a Valve that implements the org.apache.catalina.valves.AccessLogValve interface w...
    Rule Medium Severity
  • SRG-APP-000097-AS-000060

    <GroupDescription></GroupDescription>
    Group
  • HTTP status code must be logged.

    &lt;VulnDiscussion&gt;The access logfile format is defined within a Valve that implements the org.apache.catalina.valves.AccessLogValve interface w...
    Rule Low Severity
  • SRG-APP-000097-AS-000060

    <GroupDescription></GroupDescription>
    Group
  • The first line of request must be logged.

    &lt;VulnDiscussion&gt;The access logfile format is defined within a Valve that implements the org.apache.catalina.valves.AccessLogValve interface w...
    Rule Medium Severity
  • SRG-APP-000118-AS-000078

    <GroupDescription></GroupDescription>
    Group
  • $CATALINA_BASE/logs folder permissions must be set to 750.

    &lt;VulnDiscussion&gt;Tomcat file permissions must be restricted. The standard configuration is to have all Tomcat files owned by root with group T...
    Rule Medium Severity
  • SRG-APP-000118-AS-000078

    <GroupDescription></GroupDescription>
    Group
  • Files in the $CATALINA_BASE/logs/ folder must have their permissions set to 640.

    &lt;VulnDiscussion&gt;Tomcat file permissions must be restricted. The standard configuration is to have all Tomcat files owned by root with group T...
    Rule Medium Severity
  • SRG-APP-000119-AS-000079

    <GroupDescription></GroupDescription>
    Group
  • Files in the $CATALINA_BASE/conf/ folder must have their permissions set to 640.

    &lt;VulnDiscussion&gt;Tomcat file permissions must be restricted. The standard configuration is to have all Tomcat files owned by root with group T...
    Rule Medium Severity
  • SRG-APP-000119-AS-000079

    <GroupDescription></GroupDescription>
    Group
  • $CATALINA_BASE/conf folder permissions must be set to 750.

    &lt;VulnDiscussion&gt;Tomcat file permissions must be restricted. The standard configuration is to have all Tomcat files owned by root with group T...
    Rule Medium Severity
  • SRG-APP-000120-AS-000080

    <GroupDescription></GroupDescription>
    Group
  • Jar files in the $CATALINA_HOME/bin/ folder must have their permissions set to 640.

    &lt;VulnDiscussion&gt;Tomcat's file permissions must be restricted. The standard configuration is to have all Tomcat files owned by root with the g...
    Rule Medium Severity
  • SRG-APP-000121-AS-000081

    <GroupDescription></GroupDescription>
    Group
  • $CATALINA_HOME/bin folder permissions must be set to 750.

    &lt;VulnDiscussion&gt;Tomcat file permissions must be restricted. The standard configuration is to have all Tomcat files owned by root with group T...
    Rule Medium Severity
  • SRG-APP-000133-AS-000092

    <GroupDescription></GroupDescription>
    Group
  • Tomcat user UMASK must be set to 0027.

    &lt;VulnDiscussion&gt;For Unix-based systems, umask settings affect file creation permissions. If the permissions are too loose, newly created log ...
    Rule Medium Severity
  • SRG-APP-000141-AS-000095

    <GroupDescription></GroupDescription>
    Group
  • Stack tracing must be disabled.

    &lt;VulnDiscussion&gt;Stack tracing provides debugging information from the application call stacks when a runtime error is encountered. If stack t...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules