STIGQter STIGQter: STIG Summary: Apache Server 2.4 Windows Server Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Oct 2020:

The Apache web server must use encryption strength in accordance with the categorization of data hosted by the Apache web server when remote connections are provided.

DISA Rule

SV-214308r505936_rule

Vulnerability Number

V-214308

Group Title

SRG-APP-000014-WSR-000006

Rule Version

AS24-W1-000030

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Ensure the "ssl_module" is loaded in the httpd.conf file (not commented out).

Ensure the "SSLProtocol" is added and looks like the following in the <'INSTALL PATH'>\conf\httpd.conf file:

SSLProtocol -ALL +TLSv1.2

Restart the Apache service.

Check Contents

In a command line, navigate to "<'INSTALLED PATH'>\bin". Run "httpd -M" to view a list of installed modules.

If the "ssl_module" is not enabled, this is a finding.

Review the <'INSTALL PATH'>\conf\httpd.conf file to determine if the "SSLProtocol" directive exists and looks like the following:

SSLProtocol -ALL +TLSv1.2 -SSLv2 -SSLv3

If the directive does not exist or exists but does not contain "ALL +TLSv1.2 -SSLv2 -SSLv3", this is a finding.

Vulnerability Number

V-214308

Documentable

False

Rule Version

AS24-W1-000030

Severity Override Guidance

In a command line, navigate to "<'INSTALLED PATH'>\bin". Run "httpd -M" to view a list of installed modules.

If the "ssl_module" is not enabled, this is a finding.

Review the <'INSTALL PATH'>\conf\httpd.conf file to determine if the "SSLProtocol" directive exists and looks like the following:

SSLProtocol -ALL +TLSv1.2 -SSLv2 -SSLv3

If the directive does not exist or exists but does not contain "ALL +TLSv1.2 -SSLv2 -SSLv3", this is a finding.

Check Content Reference

M

Target Key

3998

Comments