UCF STIG Viewer Logo

The Apache web server must prohibit or restrict the use of nonsecure or unnecessary ports, protocols, modules, and/or services.


Overview

Finding ID Version Rule ID IA Controls Severity
V-92727 AS24-U1-000780 SV-102815r1_rule Medium
Description
Web servers provide numerous processes, features, and functionalities that use TCP/IP ports. Some of these processes may be deemed unnecessary or too unsecure to run on a production system. The Apache web server must provide the capability to disable or deactivate network-related services that are deemed to be non-essential to the server mission, are too unsecure, or are prohibited by the Ports, Protocols, and Services Management (PPSM) Category Assurance List (CAL) and vulnerability assessments.
STIG Date
Apache Server 2.4 UNIX Server Security Technical Implementation Guide 2019-09-30

Details

Check Text ( C-92033r1_chk )
Review the website to determine if HTTP and HTTPs are used in accordance with well known ports (e.g., 80 and 443) or those ports and services as registered and approved for use by the DoD PPSM. Any variation in PPS will be documented, registered, and approved by the PPSM. If not, this is a finding.
Fix Text (F-98971r1_fix)
Ensure the website enforces the use of IANA well-known ports for HTTP and HTTPS.