STIGQter STIGQter: STIG Summary: Apache Server 2.4 Windows Site Security Technical Implementation Guide Version: 1 Release: 2 Benchmark Date: 24 Jan 2020: The Apache web server must prohibit or restrict the use of nonsecure or unnecessary ports, protocols, modules, and/or services.

DISA Rule

SV-102661r1_rule

Vulnerability Number

V-92573

Group Title

SRG-APP-000383-WSR-000175

Rule Version

AS24-W2-000780

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Ensure the website enforces the use of IANA well-known ports for HTTP and HTTPS.

Check Contents

Review the web server documentation and deployment configuration to determine which ports and protocols are enabled.

Verify
the ports and protocols being used are permitted, necessary for the
operation of the web server and the hosted applications, and are secure
for a production system.

Open the <'INSTALLED PATH'>\conf\httpd.conf file.

Verify only the listener for IANA well-known ports for HTTP and HTTPS are in use.

If
any of the ports or protocols are not permitted, are nonsecure, or are
not necessary for web server operation, this is a finding.

Vulnerability Number

V-92573

Documentable

False

Rule Version

AS24-W2-000780

Severity Override Guidance

Review the web server documentation and deployment configuration to determine which ports and protocols are enabled.

Verify
the ports and protocols being used are permitted, necessary for the
operation of the web server and the hosted applications, and are secure
for a production system.

Open the <'INSTALLED PATH'>\conf\httpd.conf file.

Verify only the listener for IANA well-known ports for HTTP and HTTPS are in use.

If
any of the ports or protocols are not permitted, are nonsecure, or are
not necessary for web server operation, this is a finding.

Check Content Reference

M

Target Key

3419

Comments