UCF STIG Viewer Logo

The Apache web server must prohibit or restrict the use of nonsecure or unnecessary ports, protocols, modules, and/or services.


Overview

Finding ID Version Rule ID IA Controls Severity
V-214390 AS24-W2-000780 SV-214390r400015_rule Medium
Description
Web servers provide numerous processes, features, and functionalities that use TCP/IP ports. Some of these processes may be deemed unnecessary or too unsecure to run on a production system. The web server must provide the capability to disable or deactivate network-related services that are deemed to be non-essential to the server mission, are too unsecure, or are prohibited by the Ports, Protocols, and Services Management (PPSM) Category Assurance List (CAL) and vulnerability assessments.
STIG Date
Apache Server 2.4 Windows Site Security Technical Implementation Guide 2021-09-27

Details

Check Text ( C-15601r277911_chk )
Review the web server documentation and deployment configuration to determine which ports and protocols are enabled.

Verify
the ports and protocols being used are permitted, necessary for the
operation of the web server and the hosted applications, and are secure
for a production system.

Open the <'INSTALLED PATH'>\conf\httpd.conf file.

Verify only the listener for IANA well-known ports for HTTP and HTTPS are in use.

If
any of the ports or protocols are not permitted, are nonsecure, or are
not necessary for web server operation, this is a finding.
Fix Text (F-15599r277912_fix)
Ensure the website enforces the use of IANA well-known ports for HTTP and HTTPS.