III - Administrative Public
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000141-AS-000095
<GroupDescription></GroupDescription>Group -
The shutdown port must be disabled.
<VulnDiscussion>Tomcat listens on TCP port 8005 to accept shutdown requests. By connecting to this port and sending the SHUTDOWN command, all...Rule Medium Severity -
SRG-APP-000141-AS-000095
<GroupDescription></GroupDescription>Group -
Unapproved connectors must be disabled.
<VulnDiscussion>Connectors are how Tomcat receives requests, passes them to hosted web applications, and then sends back the results to the r...Rule Medium Severity -
SRG-APP-000141-AS-000095
<GroupDescription></GroupDescription>Group -
DefaultServlet debug parameter must be disabled.
<VulnDiscussion>The DefaultServlet serves static resources as well as serves the directory listings (if directory listings are enabled). It i...Rule Low Severity -
SRG-APP-000141-AS-000095
<GroupDescription></GroupDescription>Group -
DefaultServlet directory listings parameter must be disabled.
<VulnDiscussion>The DefaultServlet serves static resources as well as directory listings. It is declared globally in $CATALINA_BASE/conf/web....Rule Low Severity -
SRG-APP-000141-AS-000095
<GroupDescription></GroupDescription>Group -
The deployXML attribute must be set to false in hosted environments.
<VulnDiscussion>The Host element controls deployment. Automatic deployment allows for simpler management, but also makes it easier for an att...Rule Medium Severity -
SRG-APP-000141-AS-000095
<GroupDescription></GroupDescription>Group -
Autodeploy must be disabled.
<VulnDiscussion>Tomcat allows auto-deployment of applications while Tomcat is running. This can allow untested or malicious applications to b...Rule Medium Severity -
SRG-APP-000141-AS-000095
<GroupDescription></GroupDescription>Group -
xpoweredBy attribute must be disabled.
<VulnDiscussion>Individual connectors can be configured to display the Tomcat server info to clients. This information can be used to identif...Rule Low Severity -
SRG-APP-000141-AS-000095
<GroupDescription></GroupDescription>Group -
Example applications must be removed.
<VulnDiscussion>Tomcat provides example applications, documentation, and other directories in the default installation which do not serve a p...Rule Low Severity -
SRG-APP-000141-AS-000095
<GroupDescription></GroupDescription>Group -
Tomcat default ROOT web application must be removed.
<VulnDiscussion>The default ROOT web application includes the version of Tomcat that is being used, links to Tomcat documentation, examples, ...Rule Low Severity -
SRG-APP-000141-AS-000095
<GroupDescription></GroupDescription>Group -
Documentation must be removed.
<VulnDiscussion>Tomcat provides documentation and other directories in the default installation which do not serve a production use. These fi...Rule Low Severity -
SRG-APP-000142-AS-000014
<GroupDescription></GroupDescription>Group -
Applications in privileged mode must be approved by the ISSO.
<VulnDiscussion>The privileged attribute controls if a context (application) is allowed to use container provided servlets like the Manager s...Rule Medium Severity -
SRG-APP-000148-AS-000101
<GroupDescription></GroupDescription>Group -
Tomcat management applications must use LDAP realm authentication.
<VulnDiscussion>Using the local user store on a Tomcat installation does not meet a multitude of security control requirements related to use...Rule Medium Severity -
SRG-APP-000149-AS-000102
<GroupDescription></GroupDescription>Group -
JMX authentication must be secured.
<VulnDiscussion>Java Management Extensions (JMX) provides the means to remotely manage the Java VM. When enabling the JMX agent for remote mo...Rule Medium Severity -
SRG-APP-000153-AS-000104
<GroupDescription></GroupDescription>Group -
TLS must be enabled on JMX.
<VulnDiscussion>Java Management Extensions (JMX) provides the means for enterprises to remotely manage the Java VM and can be used in place o...Rule High Severity -
SRG-APP-000172-AS-000121
<GroupDescription></GroupDescription>Group -
LDAP authentication must be secured.
<VulnDiscussion>JNDIRealm is an implementation of the Tomcat Realm interface. Tomcat uses the JNDIRealm to look up users in an LDAP directory...Rule High Severity -
SRG-APP-000175-AS-000124
<GroupDescription></GroupDescription>Group -
DOD root CA certificates must be installed in Tomcat trust store.
<VulnDiscussion>Tomcat truststores are used to validate client certificates. On the Ubuntu OS, by default, Tomcat uses the "cacerts" file as ...Rule Medium Severity -
SRG-APP-000176-AS-000125
<GroupDescription></GroupDescription>Group -
Keystore file must be protected.
<VulnDiscussion>Keystore file contains authentication information used to access application data and data resources. Access to the file must...Rule Medium Severity -
SRG-APP-000179-AS-000129
<GroupDescription></GroupDescription>Group -
Tomcat must use FIPS-validated ciphers on secured connectors.
<VulnDiscussion>Connectors are how Tomcat receives requests over a network port, passes them to hosted web applications via HTTP or AJP, and ...Rule High Severity -
SRG-APP-000211-AS-000146
<GroupDescription></GroupDescription>Group -
Access to JMX management interface must be restricted.
<VulnDiscussion>Java Management Extensions (JMX) is used to provide programmatic access to Tomcat for management purposes. This includes moni...Rule Medium Severity -
SRG-APP-000211-AS-000146
<GroupDescription></GroupDescription>Group -
Access to Tomcat manager application must be restricted.
<VulnDiscussion>The Tomcat manager application is used to manage the Tomcat server and the applications that run on Tomcat. By default, the m...Rule Medium Severity -
SRG-APP-000219-AS-000147
<GroupDescription></GroupDescription>Group -
Tomcat servers must mutually authenticate proxy or load balancer connections.
<VulnDiscussion>Tomcat servers are often placed behind a proxy when exposed to both trusted and untrusted networks. This is done for security...Rule Medium Severity -
SRG-APP-000223-AS-000150
<GroupDescription></GroupDescription>Group -
Tomcat must be configured to limit data exposure between applications.
<VulnDiscussion>If RECYCLE_FACADES is true or if a security manager is in use, a new facade object will be created for each request. This red...Rule Low Severity -
SRG-APP-000225-AS-000154
<GroupDescription></GroupDescription>Group -
Clusters must operate on a trusted network.
<VulnDiscussion>Operating a Tomcat cluster on an untrusted network creates potential for unauthorized persons to view or manipulate cluster s...Rule Medium Severity -
SRG-APP-000266-AS-000169
<GroupDescription></GroupDescription>Group -
ErrorReportValve showServerInfo must be set to false.
<VulnDiscussion>The Error Report Valve is a simple error handler for HTTP status codes that will generate and return HTML error pages. It can...Rule Medium Severity -
SRG-APP-000267-AS-000170
<GroupDescription></GroupDescription>Group -
Default error pages for manager application must be customized.
<VulnDiscussion>Default error pages that accompany the manager application provide educational information on how to configure user accounts ...Rule Low Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.