STIGQter STIGQter: STIG Summary: Web Server Security Requirements Guide Version: 2 Release: 3 Benchmark Date: 26 Apr 2019:

A web server, behind a load balancer or proxy server, must produce log records containing the client IP information as the source and destination and not the load balancer or proxy IP information with each event.

DISA Rule

SV-54193r3_rule

Vulnerability Number

V-41616

Group Title

SRG-APP-000098-WSR-000060

Rule Version

SRG-APP-000098-WSR-000060

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the web server to generate the client source, not the load balancer or proxy server, of each logable event.

Check Contents

Review the deployment configuration to determine if the web server is sitting behind a proxy server. If the web server is not sitting behind a proxy server, this finding is NA.

If the web server is behind a proxy server, review the documentation and deployment configuration to determine if the web server is configured to generate sufficient information to resolve the source, e.g. source IP, of the logged event and not the proxy server.

Request a user access the hosted application through the proxy server and generate logable events, and then review the logs to determine if the source of the event can be established.

If the source of the event cannot be determined, this is a finding.

Vulnerability Number

V-41616

Documentable

False

Rule Version

SRG-APP-000098-WSR-000060

Severity Override Guidance

Review the deployment configuration to determine if the web server is sitting behind a proxy server. If the web server is not sitting behind a proxy server, this finding is NA.

If the web server is behind a proxy server, review the documentation and deployment configuration to determine if the web server is configured to generate sufficient information to resolve the source, e.g. source IP, of the logged event and not the proxy server.

Request a user access the hosted application through the proxy server and generate logable events, and then review the logs to determine if the source of the event can be established.

If the source of the event cannot be determined, this is a finding.

Check Content Reference

M

Target Key

2557

Comments