WBSP-AS-001390 - The WebSphere Application Servers must not be in the DMZ.

Information

The application server consists of the management interface and hosted applications. By separating the management interface from hosted applications, the user must authenticate as a privileged user to the management interface before being presented with management functionality. This prevents non-privileged users from having visibility to functions not available to the user. By limiting visibility, a compromised non-privileged account does not offer information to the attacker to functionality and information needed to further the attack on the application server.

Application server management functionality includes functions necessary to administer the application server and requires privileged access via one of the accounts assigned to a management role. The hosted application and hosted application functionality consists of the assets needed for the application to function, such as the business logic, databases, user authentication, etc.

The separation of application server administration functionality from hosted application functionality is either physical or logical and is accomplished by using different computers, different central processing units, different instances of the operating system, network addresses, network ports, or combinations of these methods, as appropriate.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

If any application server host is installed in the DMZ, reassign IP address to a secured network and reconfigure the application server.

See Also

http://iasecontent.disa.mil/stigs/zip/U_IBM_WebSphere_Traditional_V9-x_V1R1_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-2, CAT|II, CCI|CCI-001082, Rule-ID|SV-96085r1_rule, STIG-ID|WBSP-AS-001390, Vuln-ID|V-81371

Plugin: Unix

Control ID: 93c98f156fa1cfaae52b21bbe24c89967f18afcec1adb9aa3fc8aea3556c1ecb