Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-13613 | WA230 IIS6 | SV-38174r1_rule | ECSC-1 | Medium |
Description |
---|
The IAVM process does not address all patches that have been identified for the host operating system or, in this case, the web server software environment. Many vendors have subscription services available to notify users of known security threats. The site needs to be aware of these fixes and make determinations based on local policy and what software features are installed, if these patches need to be applied. In some cases, patches also apply to middleware and database systems. Maintaining the security of web servers requires frequent reviews of security notices. Many security notices mandate the installation of a software patch to overcome security vulnerabilities. SAs and IAOs should regularly check the vendor support web site for patches and information related to the web server software. All applicable security patches will be applied to the operating system and to the web server software. Security patches are deemed applicable if the product is installed, even if it is not used or is disabled. |
STIG | Date |
---|---|
IIS6 Server | 2014-12-05 |
Check Text ( C-37556r1_chk ) |
---|
Query the Web Administrator to determine if the site has a detailed process as part of its configuration management plan to stay compliant with all security-related patches. Proposed Questions: How does the SA stay current with web server vendor patches? How is the SA notified when a new security patch is issued by the vendor? What is the process followed for applying patches to the web server (excluding IAVM)? If the site is not in compliance with all applicable security patches, this is a finding. |
Fix Text (F-32802r1_fix) |
---|
Establish a detailed process as part of the configuration management plan to stay compliant with all web server security-related patches. |