Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000001-AS-000001

    Group
  • The number of allowed simultaneous sessions to the manager application must be limited.

    The manager application provides configuration access to the Tomcat server. Access to the manager application must be limited and that includes the number of sessions allowed to access the manageme...
    Rule Low Severity
  • SRG-APP-000014-AS-000009

    Group
  • Secured connectors must be configured to use strong encryption ciphers.

    The Tomcat <Connector> element controls the TLS protocol and the associated ciphers used. If a strong cipher is not selected, an attacker may be able to circumvent encryption protections that are c...
    Rule Medium Severity
  • SRG-APP-000015-AS-000010

    Group
  • HTTP Strict Transport Security (HSTS) must be enabled.

    HTTP Strict Transport Security (HSTS) instructs web browsers to only use secure connections for all future requests when communicating with a website. Doing so helps prevent SSL protocol attacks, S...
    Rule Low Severity
  • SRG-APP-000015-AS-000010

    Group
  • TLS 1.2 must be used on secured HTTP connectors.

    Using older versions of TLS introduces security vulnerabilities that exist in the older versions of the protocol. Tomcat by default will use all available versions of the SSL/TLS protocols unless t...
    Rule Medium Severity
  • SRG-APP-000016-AS-000013

    Group
  • AccessLogValve must be configured for each application context.

    Tomcat has the ability to host multiple contexts (applications) on one physical server by using the <Host><Context> attribute. This allows the admin to specify audit log settings on a per applicati...
    Rule Medium Severity
  • SRG-APP-000033-AS-000024

    Group
  • Default password for keystore must be changed.

    Tomcat currently operates only on JKS, PKCS11, or PKCS12 format keystores. The JKS format is Java's standard "Java KeyStore" format, and is the format created by the keytool command-line utility wh...
    Rule High Severity
  • SRG-APP-000033-AS-000024

    Group
  • Cookies must have secure flag set.

    It is possible to steal or manipulate web application session and cookies without having a secure cookie. Configuring the secure flag injects the setting into the response header. The $CATALINA_BA...
    Rule Medium Severity
  • SRG-APP-000033-AS-000024

    Group
  • Cookies must have http-only flag set.

    It is possible to steal or manipulate web application session and cookies without having a secure cookie. Configuring the secure flag injects the setting into the response header. The $CATALINA_BA...
    Rule Medium Severity
  • SRG-APP-000033-AS-000024

    Group
  • DefaultServlet must be set to readonly for PUT and DELETE.

    The DefaultServlet is a servlet provided with Tomcat. It is called when no other suitable page can be displayed to the client. The DefaultServlet serves static resources as well as directory listin...
    Rule Medium Severity
  • SRG-APP-000033-AS-000024

    Group
  • Connectors must be secured.

    The unencrypted HTTP protocol does not protect data from interception or alteration which can subject users to eavesdropping, tracking, and the modification of received data. To secure an HTTP conn...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules