Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000141-AS-000095

    <GroupDescription></GroupDescription>
    Group
  • Autodeploy must be disabled.

    &lt;VulnDiscussion&gt;Tomcat allows auto-deployment of applications while Tomcat is running. This can allow untested or malicious applications to b...
    Rule Medium Severity
  • SRG-APP-000141-AS-000095

    <GroupDescription></GroupDescription>
    Group
  • xpoweredBy attribute must be disabled.

    &lt;VulnDiscussion&gt;Individual connectors can be configured to display the Tomcat server info to clients. This information can be used to identif...
    Rule Low Severity
  • SRG-APP-000141-AS-000095

    <GroupDescription></GroupDescription>
    Group
  • Example applications must be removed.

    &lt;VulnDiscussion&gt;Tomcat provides example applications, documentation, and other directories in the default installation which do not serve a p...
    Rule Low Severity
  • SRG-APP-000141-AS-000095

    <GroupDescription></GroupDescription>
    Group
  • Tomcat default ROOT web application must be removed.

    &lt;VulnDiscussion&gt;The default ROOT web application includes the version of Tomcat that is being used, links to Tomcat documentation, examples, ...
    Rule Low Severity
  • SRG-APP-000141-AS-000095

    <GroupDescription></GroupDescription>
    Group
  • Documentation must be removed.

    &lt;VulnDiscussion&gt;Tomcat provides documentation and other directories in the default installation which do not serve a production use. These fi...
    Rule Low Severity
  • SRG-APP-000142-AS-000014

    <GroupDescription></GroupDescription>
    Group
  • Applications in privileged mode must be approved by the ISSO.

    &lt;VulnDiscussion&gt;The privileged attribute controls if a context (application) is allowed to use container provided servlets like the Manager s...
    Rule Medium Severity
  • SRG-APP-000148-AS-000101

    <GroupDescription></GroupDescription>
    Group
  • Tomcat management applications must use LDAP realm authentication.

    &lt;VulnDiscussion&gt;Using the local user store on a Tomcat installation does not meet a multitude of security control requirements related to use...
    Rule Medium Severity
  • SRG-APP-000149-AS-000102

    <GroupDescription></GroupDescription>
    Group
  • JMX authentication must be secured.

    &lt;VulnDiscussion&gt;Java Management Extensions (JMX) provides the means to remotely manage the Java VM. When enabling the JMX agent for remote mo...
    Rule Medium Severity
  • SRG-APP-000153-AS-000104

    <GroupDescription></GroupDescription>
    Group
  • TLS must be enabled on JMX.

    &lt;VulnDiscussion&gt;Java Management Extensions (JMX) provides the means for enterprises to remotely manage the Java VM and can be used in place o...
    Rule High Severity
  • SRG-APP-000172-AS-000121

    <GroupDescription></GroupDescription>
    Group
  • LDAP authentication must be secured.

    &lt;VulnDiscussion&gt;JNDIRealm is an implementation of the Tomcat Realm interface. Tomcat uses the JNDIRealm to look up users in an LDAP directory...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules