STIGQter STIGQter: STIG Summary: Apache Server 2.4 UNIX Server Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 22 Jan 2021:

The Apache web server must prohibit or restrict the use of nonsecure or unnecessary ports, protocols, modules, and/or services.

DISA Rule

SV-214266r612240_rule

Vulnerability Number

V-214266

Group Title

SRG-APP-000383-WSR-000175

Rule Version

AS24-U1-000780

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Ensure the website enforces the use of IANA well-known ports for HTTP and HTTPS.

Check Contents

Review the website to determine if HTTP and HTTPs are used in accordance with well known ports (e.g., 80 and 443) or those ports and services as registered and approved for use by the DoD PPSM. Any variation in PPS will be documented, registered, and approved by the PPSM. If not, this is a finding.

Vulnerability Number

V-214266

Documentable

False

Rule Version

AS24-U1-000780

Severity Override Guidance

Review the website to determine if HTTP and HTTPs are used in accordance with well known ports (e.g., 80 and 443) or those ports and services as registered and approved for use by the DoD PPSM. Any variation in PPS will be documented, registered, and approved by the PPSM. If not, this is a finding.

Check Content Reference

M

Target Key

3996

Comments