Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-2234 | WG040 A22 | SV-32957r1_rule | Medium |
Description |
---|
It is important to segregate public web server resources from private resources located behind the DoD DMZ in order to protect private assets. When folders, drives or other resources are directly shared between the public web server and private servers the intent of data and resource segregation can be compromised. In addition to the requirements of the DoD Internet-NIPRNet DMZ STIG that isolates inbound traffic from the external network to the internal network, resources such as printers, files, and folders/directories will not be shared between public web servers and assets located within the internal network. |
STIG | Date |
---|---|
APACHE 2.2 Server for UNIX Security Technical Implementation Guide | 2019-01-07 |
Check Text ( C-33639r1_chk ) |
---|
Determine whether the public web server has a two-way trusted relationship with any private asset located within the network. Private web server resources (e.g., drives, folders, printers, etc.) will not be directly mapped to or shared with public web servers. If sharing is selected for any web folder, this is a finding. The following checks indicate inappropriate sharing of private resources with the public web server: If private resources (e.g., drives, partitions, folders/directories, printers, etc.) are shared with the public web server, then this is a finding. |
Fix Text (F-29280r1_fix) |
---|
Configure the public web server to not have a trusted relationship with any system resource that is also not accessible to the public. Web content is not to be shared via Microsoft shares or NFS mounts. |