Item Search

NameAudit NamePluginCategory
1 - Application specific logging - start.jar --module=loggingTNS Best Practice Jetty 9 LinuxUnix
2 - Remove or Disable Example Content - enable-welcome-rootTNS Best Practice JBoss 7 LinuxUnix

CONFIGURATION MANAGEMENT

2 - Specify file handler in jetty-logging.properties files - org.eclipse.jetty.LEVEL=INFOTNS Best Practice Jetty 9 LinuxUnix

AUDIT AND ACCOUNTABILITY

2 - Specify file handler in jetty-logging.properties files - org.eclipse.jetty.util.log.class=org.eclipse.jetty.util.log.StrErrLogTNS Best Practice Jetty 9 LinuxUnix

AUDIT AND ACCOUNTABILITY

2.1 Ensure Authentication is configuredCIS MongoDB 4 L1 OS Linux v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

2.1 Ensure Authentication is configuredCIS MongoDB 4 L1 OS Windows v1.0.0Windows

IDENTIFICATION AND AUTHENTICATION

3 - Audit Logging - LoggerTNS Best Practice JBoss 7 LinuxUnix

AUDIT AND ACCOUNTABILITY

3 - Configure log file size limit - SettingsTNS Best Practice Jetty 9 LinuxUnix

AUDIT AND ACCOUNTABILITY

6 - EncryptionTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

6 - Run your Instance as non privileged userTNS Best Practice JBoss 7 LinuxUnix

ACCESS CONTROL

7 - SSL implementation - start.ini --module=deployTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

7 - SSL implementation - start.ini --module=httpTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

7 - SSL implementation - start.ini --module=httpsTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

7 - SSL implementation - start.ini --module=sslTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

8 - Management IP - .htacess existsTNS Best Practice Jetty 9 LinuxUnix
8 - Management IP - review $jetty_home/contexts xml fileTNS Best Practice Jetty 9 LinuxUnix
11 - JSP RegenerationTNS Best Practice JBoss 7 LinuxUnix

CONFIGURATION MANAGEMENT

12 - Restrict access to logs directory - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

12 - Restrict access to logs directory - ownerTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

14 - Restrict access to binaries directory - ownerTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

14 - SSL Encryption - Modify WSDL AddressTNS Best Practice JBoss 7 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

15 - AuthenticationTNS Best Practice JBoss 7 LinuxUnix

IDENTIFICATION AND AUTHENTICATION

15 - Restrict access to web application directory - ownerTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

16 - ORB Subsystem - Initializers OnTNS Best Practice JBoss 7 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

16 - Restrict access to JETTY.policy - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

17 - Restrict access to JETTY.properties - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

19 - Restrict access to logging.properties - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

19 - Restrict access to logging.properties - ownerTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

20 - Enable EncryptionTNS Best Practice JBoss 7 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

20 - Restrict access to server.xml - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

20 - Restrict access to server.xml - ownerTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

23 - Strong password policy must be establishedTNS Best Practice Jetty 9 LinuxUnix
24 - Remove extraneous files and directories - $JETTY_BASE/webapps/docTNS Best Practice Jetty 9 LinuxUnix

CONFIGURATION MANAGEMENT

24 - Remove extraneous files and directories - $JETTY_BASE/webapps/examplesTNS Best Practice Jetty 9 LinuxUnix

CONFIGURATION MANAGEMENT

24 - Remove extraneous files and directories - $JETTY_BASE/webapps/ROOT/adminTNS Best Practice Jetty 9 LinuxUnix

CONFIGURATION MANAGEMENT

24 - Remove extraneous files and directories - $JETTY_BASE/webapps/servlet-exampleTNS Best Practice Jetty 9 LinuxUnix

CONFIGURATION MANAGEMENT

25 - Disable Unused ConnectorsTNS Best Practice Jetty 9 LinuxUnix
27 - Ensure SSLEnabled is set to True for Sensitive Connectors - SSLEnabledTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

27 - Ensure SSLEnabled is set to True for Sensitive Connectors - SSLEngineTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

32 - Disabling auto deployment of applicationsTNS Best Practice Jetty 9 LinuxUnix

CONFIGURATION MANAGEMENT

33 - Disable deploy on startup of applicationsTNS Best Practice Jetty 9 LinuxUnix

CONFIGURATION MANAGEMENT

34 - Ensure Web content directory is on a separate partition from the system filesTNS Best Practice Jetty 9 LinuxUnix
35 - Do not allow custom header status messagesTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND INFORMATION INTEGRITY

36 - Configure connectionTimeoutTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

38 - Force SSL for all applicationsTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

39 - Increase the entropy in session identifiersTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

40 - Do not allow symbolic linkingTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

42 - Do not allow cross context requestsTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

43 - Do not resolve hosts on logging valves - SERVER_XMLTNS Best Practice Jetty 9 LinuxUnix

CONFIGURATION MANAGEMENT

44 - Use Lockout RealmsTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL