II - Mission Support Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000316-WSR-000170
<GroupDescription></GroupDescription>Group -
The IIS 10.0 web server must provide the capability to immediately disconnect or disable remote access to the hosted applications.
<VulnDiscussion>During an attack on the web server or any of the hosted applications, the system administrator may need to disconnect or disa...Rule Medium Severity -
SRG-APP-000340-WSR-000029
<GroupDescription></GroupDescription>Group -
IIS 10.0 web server system files must conform to minimum file permission requirements.
<VulnDiscussion>This check verifies the key web server system configuration files are owned by the SA or the web administrator controlled acc...Rule Medium Severity -
SRG-APP-000357-WSR-000150
<GroupDescription></GroupDescription>Group -
The IIS 10.0 web server must use a logging mechanism configured to allocate log record storage capacity large enough to accommodate the logging requirements of the IIS 10.0 web server.
<VulnDiscussion>To ensure the logging mechanism used by the web server has sufficient storage capacity in which to write the logs, the loggin...Rule Medium Severity -
SRG-APP-000380-WSR-000072
<GroupDescription></GroupDescription>Group -
Access to web administration tools must be restricted to the web manager and the web managers designees.
<VulnDiscussion>A web server can be modified through parameter modification, patch installation, upgrades to the web server or modules, and s...Rule Medium Severity -
SRG-APP-000383-WSR-000175
<GroupDescription></GroupDescription>Group -
The IIS 10.0 web server must not be running on a system providing any other role.
<VulnDiscussion>Web servers provide numerous processes, features, and functionalities that utilize TCP/IP ports. Some of these processes may ...Rule Medium Severity -
SRG-APP-000383-WSR-000175
<GroupDescription></GroupDescription>Group -
The Internet Printing Protocol (IPP) must be disabled on the IIS 10.0 web server.
<VulnDiscussion>The use of IPP on an IIS web server allows client access to shared printers. This privileged access could allow remote code e...Rule Medium Severity -
SRG-APP-000435-WSR-000148
<GroupDescription></GroupDescription>Group -
The IIS 10.0 web server must be tuned to handle the operational requirements of the hosted application.
<VulnDiscussion>A Denial of Service (DoS) can occur when the web server is overwhelmed and can no longer respond to additional requests. A we...Rule Medium Severity -
SRG-APP-000439-WSR-000152
<GroupDescription></GroupDescription>Group -
IIS 10.0 web server session IDs must be sent to the client using TLS.
<VulnDiscussion>The HTTP protocol is a stateless protocol. To maintain a session, a session identifier is used. The session identifier is a p...Rule Medium Severity -
SRG-APP-000439-WSR-000156
<GroupDescription></GroupDescription>Group -
An IIS 10.0 web server must maintain the confidentiality of controlled information during transmission through the use of an approved Transport Layer Security (TLS) version.
<VulnDiscussion>TLS encryption is a required security setting for a private web server. Encryption of private information is essential to ens...Rule High Severity -
SRG-APP-000439-WSR-000156
<GroupDescription></GroupDescription>Group -
The IIS 10.0 web server must maintain the confidentiality of controlled information during transmission through the use of an approved Transport Layer Security (TLS) version.
<VulnDiscussion>TLS is a required transmission protocol for a web server hosting controlled information. The use of TLS provides confidential...Rule Medium Severity -
SRG-APP-000516-WSR-000079
<GroupDescription></GroupDescription>Group -
All accounts installed with the IIS 10.0 web server software and tools must have passwords assigned and default passwords changed.
<VulnDiscussion>During installation of the web server software, accounts are created for the web server to operate properly. The accounts ins...Rule High Severity -
SRG-APP-000516-WSR-000174
<GroupDescription></GroupDescription>Group -
Unspecified file extensions on a production IIS 10.0 web server must be removed.
<VulnDiscussion>By allowing unspecified file extensions to execute, the web servers attack surface is significantly increased. This increased...Rule Medium Severity -
SRG-APP-000516-WSR-000174
<GroupDescription></GroupDescription>Group -
The IIS 10.0 web server must have a global authorization rule configured to restrict access.
<VulnDiscussion>Authorization rules can be configured at the server, website, folder (including Virtual Directories), or file level. It is re...Rule Medium Severity -
SRG-APP-000001-WSR-000001
<GroupDescription></GroupDescription>Group -
The IIS 10.0 websites MaxConnections setting must be configured to limit the number of allowed simultaneous session requests.
<VulnDiscussion>Resource exhaustion can occur when an unlimited number of concurrent requests are allowed on a website, facilitating a Denial...Rule Medium Severity -
SRG-APP-000516-WSR-000174
<GroupDescription></GroupDescription>Group -
The IIS 10.0 web server must enable HTTP Strict Transport Security (HSTS).
<VulnDiscussion>HTTP Strict Transport Security (HSTS) ensures browsers always connect to a website over TLS. HSTS exists to remove the need f...Rule Low Severity -
SRG-APP-000141-WSR-000075
<GroupDescription></GroupDescription>Group -
An IIS Server configured to be a SMTP relay must require authentication.
<VulnDiscussion>Anonymous SMTP relays are strictly prohibited. An anonymous SMTP relay can be a vector for many types of malicious activity n...Rule Medium Severity -
SRG-APP-000266-WSR-000159
<GroupDescription></GroupDescription>Group -
HTTPAPI Server version must be removed from the HTTP Response Header information.
<VulnDiscussion>HTTP Response Headers contain information that could enable an attacker to gain access to an information system. Failure to p...Rule Low Severity -
SRG-APP-000266-WSR-000159
<GroupDescription></GroupDescription>Group -
ASP.NET version must be removed from the HTTP Response Header information.
<VulnDiscussion>HTTP Response Headers contain information that could enable an attacker to gain access to an information system. Failure to p...Rule Low Severity -
SRG-APP-000141-WSR-000015
<GroupDescription></GroupDescription>Group -
The Request Smuggling filter must be enabled.
<VulnDiscussion>Security scans show Request Smuggling vulnerability on IIS server. The vulnerability allows a remote attacker to perform HTT...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.