|Finding ID||Version||Rule ID||IA Controls||Severity|
|To properly monitor the changes to the web server and the hosted applications, logging must be enabled. Along with logging being enabled, each record must properly contain the changes made and the names of those who made the changes. Allowing anonymous users the capability to change the web server or the hosted application will not generate proper log information that can then be used for forensic reporting in the case of a security issue. Allowing anonymous users to make changes will also grant change capabilities to anybody without forcing a user to authenticate before the changes can be made. Satisfies: SRG-APP-000211-WSR-000031, SRG-APP-000141-WSR-000078, SRG-APP-000380-WSR-000072|
|Apache Server 2.4 UNIX Server Security Technical Implementation Guide||2019-12-19|
|Check Text ( C-91977r1_chk )|
| Obtain a list of the user accounts for the system, noting the privileges for each account. |
Verify with the SA or the Information System Security Officer (ISSO) that all privileged accounts are mission essential and documented.
Verify with the SA or the ISSO that all non-administrator access to shell scripts and operating system functions are mission essential and documented.
If undocumented privileged accounts are present, this is a finding.
If undocumented access to shell scripts or operating system functions is present, this is a finding.
|Fix Text (F-98915r1_fix)|
|Ensure non-administrators are not allowed access to the directory tree, the shell, or other operating system functions and utilities.|