Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000266

    <GroupDescription></GroupDescription>
    Group
  • The web server must display a default hosted application web page, not a directory listing, when a requested web page cannot be found.

    &lt;VulnDiscussion&gt;The goal is to completely control the web user's experience in navigating any portion of the web document root directories. E...
    Rule Medium Severity
  • SRG-APP-000266

    <GroupDescription></GroupDescription>
    Group
  • Warning and error messages displayed to clients must be modified to minimize the identity of the web server, patches, loaded modules, and directory paths.

    &lt;VulnDiscussion&gt;Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information abou...
    Rule Medium Severity
  • SRG-APP-000266

    <GroupDescription></GroupDescription>
    Group
  • Debugging and trace information used to diagnose the web server must be disabled.

    &lt;VulnDiscussion&gt;Information needed by an attacker to begin looking for possible vulnerabilities in a web server includes any information abou...
    Rule Medium Severity
  • SRG-APP-000295

    <GroupDescription></GroupDescription>
    Group
  • The web server must set an absolute session timeout value of eight hours or less.

    &lt;VulnDiscussion&gt;Leaving sessions open indefinitely is a major security risk. An attacker can easily use an already authenticated session to a...
    Rule Medium Severity
  • SRG-APP-000295

    <GroupDescription></GroupDescription>
    Group
  • The web server must set an inactive timeout for sessions.

    &lt;VulnDiscussion&gt;Leaving sessions open indefinitely is a major security risk. An attacker can easily use an already authenticated session to a...
    Rule Medium Severity
  • SRG-APP-000315

    <GroupDescription></GroupDescription>
    Group
  • Remote access to the web server must follow access policy or work in conjunction with enterprise tools designed to enforce policy requirements.

    &lt;VulnDiscussion&gt;Remote access to the web server is any access that communicates through an external, non-organization-controlled network. Rem...
    Rule Medium Severity
  • SRG-APP-000315

    <GroupDescription></GroupDescription>
    Group
  • The web server must restrict inbound connections from nonsecure zones.

    &lt;VulnDiscussion&gt;Remote access to the web server is any access that communicates through an external, non-organization-controlled network. Rem...
    Rule Medium Severity
  • SRG-APP-000316

    <GroupDescription></GroupDescription>
    Group
  • The web server must provide the capability to immediately disconnect or disable remote access to the hosted applications.

    &lt;VulnDiscussion&gt;During an attack on the web server or any of the hosted applications, the system administrator may need to disconnect or disa...
    Rule Medium Severity
  • SRG-APP-000340

    <GroupDescription></GroupDescription>
    Group
  • Non-privileged accounts on the hosting system must only access web server security-relevant information and functions through a distinct administrative account.

    &lt;VulnDiscussion&gt;By separating web server security functions from non-privileged users, roles can be developed that can then be used to admini...
    Rule Medium Severity
  • SRG-APP-000357

    <GroupDescription></GroupDescription>
    Group
  • The web server must use a logging mechanism that is configured to allocate log record storage capacity large enough to accommodate the logging requirements of the web server.

    &lt;VulnDiscussion&gt;In order to make certain that the logging mechanism used by the web server has sufficient storage capacity in which to write ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules