STIGQter STIGQter: STIG Summary: APACHE 2.2 Site for Windows Security Technical Implementation Guide Version: 1 Release: 13 Benchmark Date: 25 Jan 2019:

Web server administration must be performed over a secure path or at the local console.

DISA Rule

SV-33110r3_rule

Vulnerability Number

V-2249

Group Title

WG230

Rule Version

WG230 W22

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

Ensure the web server administration is only performed over a secure path.

Check Contents

If web administration is performed at the console, this check is N/A.

If web administration is performed remotely the following checks will apply:
1. If administration of the server is performed remotely, it will only be performed securely by system administrators.
2. If web site administration or web application administration has been delegated, those users will be documented and approved by the ISSO.
3. Remote administration must be in compliance with any requirements contained within the Windows Server STIGs, and any applicable network STIGs.
4. Remote administration of any kind will be restricted to documented and authorized personnel.
5. All users performing remote administration must be authenticated.
6. All remote sessions will be encrypted and they will utilize FIPS 140-2 approved protocols.

FIPS 140-2 approved TLS versions include TLS V1.0 or greater.

Review with site management how remote administration, if applicable, is configured on the web site. If remote management meets the criteria listed above, this is not a finding. If remote management is utilized and does not meet the criteria listed above, this is a finding.

Vulnerability Number

V-2249

Documentable

False

Rule Version

WG230 W22

Severity Override Guidance

If web administration is performed at the console, this check is N/A.

If web administration is performed remotely the following checks will apply:
1. If administration of the server is performed remotely, it will only be performed securely by system administrators.
2. If web site administration or web application administration has been delegated, those users will be documented and approved by the ISSO.
3. Remote administration must be in compliance with any requirements contained within the Windows Server STIGs, and any applicable network STIGs.
4. Remote administration of any kind will be restricted to documented and authorized personnel.
5. All users performing remote administration must be authenticated.
6. All remote sessions will be encrypted and they will utilize FIPS 140-2 approved protocols.

FIPS 140-2 approved TLS versions include TLS V1.0 or greater.

Review with site management how remote administration, if applicable, is configured on the web site. If remote management meets the criteria listed above, this is not a finding. If remote management is utilized and does not meet the criteria listed above, this is a finding.

Check Content Reference

M

Responsibility

System Administrator

Target Key

161

Comments