Item Search

NameAudit NamePluginCategory
4 - Restrict access to $JETTY_HOME - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

4 - Send logs to a remote serverTNS Best Practice JBoss 7 LinuxUnix

AUDIT AND ACCOUNTABILITY

5 - AuthenticationTNS Best Practice Jetty 9 LinuxUnix
5.10 Ensure an AWS Managed Config Rule for encrypted volumes is applied to Web Tier - KMS IDCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

7 - SSL implementation - start.jar --module=httpsTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

7 - SSL implementation - start.jar --module=sslTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

9 - Information LeakageTNS Best Practice Jetty 9 LinuxUnix
10 - Access Control - Security RealmsTNS Best Practice Jetty 9 LinuxUnix
18 - Restrict access to context.xml - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

18 - Restrict access to context.xml - ownerTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

19 - Cluster AuthenticationTNS Best Practice JBoss 7 LinuxUnix

ACCESS CONTROL

21 - Restrict access to users.xml - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

22 - Use secure RealmsTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

24 - Remove extraneous files and directories - $JETTY_BASE/webapps/js-examplesTNS Best Practice Jetty 9 LinuxUnix

CONFIGURATION MANAGEMENT

26 - Setup Client-cert AuthenticationTNS Best Practice Jetty 9 LinuxUnix

IDENTIFICATION AND AUTHENTICATION

30 - Ensure sslProtocol is set to TLS for Secure ConnectorTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

43 - Do not resolve hosts on logging valves - CONTEXT_XMLTNS Best Practice Jetty 9 LinuxUnix

CONFIGURATION MANAGEMENT

45 - Restrict runtime access to sensitive packagesTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

Buffer overflow protection should be configured 'LimitRequestFields'TNS IBM HTTP Server Best PracticeUnix

SYSTEM AND INFORMATION INTEGRITY

Buffer overflow protection should be configured 'LimitRequestline'TNS IBM HTTP Server Best PracticeUnix

SYSTEM AND INFORMATION INTEGRITY

CGI-BIN directory should be disabled. 'AddModule mod_env.c'TNS IBM HTTP Server Best PracticeUnix

CONFIGURATION MANAGEMENT

CGI-BIN directory should be disabled. 'LoadModule cgi_module'TNS IBM HTTP Server Best PracticeUnix

CONFIGURATION MANAGEMENT

Configuration files should be secured against unauthorized access.TNS IBM HTTP Server Best PracticeWindows
Configuration files should be secured against unauthorized access.TNS IBM HTTP Server Best PracticeUnix
Directory access permissions should be restricted.TNS IBM HTTP Server Best PracticeUnix

CONFIGURATION MANAGEMENT

EX13-EG-000105 - Exchange Global Outbound Message size must be controlled.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX16-MB-000440 - The Exchange global outbound message size must be controlled.DISA Microsoft Exchange 2016 Mailbox Server STIG v2r6Windows

SYSTEM AND COMMUNICATIONS PROTECTION

File permissions in the root document should only be accessible by administratorTNS IBM HTTP Server Best PracticeUnix
HTTP TRACE method should be disabled. 'RewriteLog'TNS IBM HTTP Server Best PracticeUnix

CONFIGURATION MANAGEMENT

HTTP TRACE method should be disabled. 'RewriteLogLevel'TNS IBM HTTP Server Best PracticeWindows

AUDIT AND ACCOUNTABILITY

HTTP TRACE method should be disabled. 'TraceEnable'TNS IBM HTTP Server Best PracticeWindows

CONFIGURATION MANAGEMENT

Keep Alive Timeout setting value should be appropriately configured.TNS IBM HTTP Server Best PracticeUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Latest Patches/Fixes should be installedTNS IBM HTTP Server Best PracticeWindows

SYSTEM AND INFORMATION INTEGRITY

Latest Patches/Fixes should be installedTNS IBM HTTP Server Best PracticeUnix

SYSTEM AND INFORMATION INTEGRITY

Limit HTTP methods allowed by the Web Server.TNS IBM HTTP Server Best PracticeUnix

CONFIGURATION MANAGEMENT

Logging Directives should be restricted to authorized users. - 'CustomLog logs/access_log combined'TNS IBM HTTP Server Best PracticeWindows

AUDIT AND ACCOUNTABILITY

Logging Directives should be restricted to authorized users. - 'ErrorLog logs/error_log'TNS IBM HTTP Server Best PracticeWindows

AUDIT AND ACCOUNTABILITY

Logging Directives should be restricted to authorized users. - 'LogFormat'TNS IBM HTTP Server Best PracticeUnix

AUDIT AND ACCOUNTABILITY

Logging Directives should be restricted to authorized users. - 'LogLevel notice'TNS IBM HTTP Server Best PracticeUnix

AUDIT AND ACCOUNTABILITY

Logs containing auditing information should be secured at the directory level.TNS IBM HTTP Server Best PracticeUnix

AUDIT AND ACCOUNTABILITY

Logs containing auditing information should be secured at the directory level.TNS IBM HTTP Server Best PracticeWindows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

MaxSpareServers parameter value should be appropriately configured.TNS IBM HTTP Server Best PracticeWindows

SYSTEM AND COMMUNICATIONS PROTECTION

MinSpareServers parameter value should be appropriately configured.TNS IBM HTTP Server Best PracticeUnix

SYSTEM AND COMMUNICATIONS PROTECTION

MinSpareServers parameter value should be appropriately configured.TNS IBM HTTP Server Best PracticeWindows

SYSTEM AND COMMUNICATIONS PROTECTION

Non-Essential modules should be disabled. 'mod_include'TNS IBM HTTP Server Best PracticeWindows

CONFIGURATION MANAGEMENT

Non-Essential modules should be disabled. 'mod_info'TNS IBM HTTP Server Best PracticeWindows

CONFIGURATION MANAGEMENT

Non-Essential modules should be disabled. 'mod_info'TNS IBM HTTP Server Best PracticeUnix

CONFIGURATION MANAGEMENT

Server version information parameters should be turned off - 'ServerSignature Off'TNS IBM HTTP Server Best PracticeUnix

SYSTEM AND COMMUNICATIONS PROTECTION

StartServers parameter value should be appropriately configured.TNS IBM HTTP Server Best PracticeUnix

SYSTEM AND COMMUNICATIONS PROTECTION

TNS_BestPractice_Citrix_XenServer.audit from TNS Citrix XenServer Best PracticesTNS Citrix XenServerUnix