UCF STIG Viewer Logo

IIS 7.0 Server STIG


Overview

Date Finding Count (135)
2019-03-22 CAT I (High): 14 CAT II (Med): 104 CAT III (Low): 17
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-13699 High The IIS web site permissions "Write" or "Script Source" must not be selected.
V-13698 High The IISADMPWD directory has not been removed from the Web server.
V-13591 High Classified web servers will be afforded physical security commensurate with the classification of its content.
V-2258 High The web client account access to the content and scripts directories will be limited to read and execute.
V-13686 High Remote authors or content providers will only use secure encrypted logons and connections to upload files to the Document Root directory.
V-2249 High Web server administration will be performed over a secure path or at the console.
V-2247 High Only administrators are allowed access to the directory tree, the shell, or other operating system functions and utilities.
V-2246 High The web server must use a vendor-supported version of the web server software.
V-13733 High The ”IncludesNOEXEC” directive is not enabled on any directory that maintains Server Side Includes.
V-6537 High Anonymous access accounts are restricted.
V-2267 High Unused and vulnerable script mappings in IIS are not removed or set to the 404.dll.
V-13621 High All web server documentation, sample code, example applications, and tutorials will be removed from a production web server.
V-13701 High The command shell options are not disabled.
V-13713 High A unique non-privileged account must be used to run Worker Process Identities.
V-13694 Medium Public web servers will use TLS if authentication is required.
V-6755 Medium Directory Browsing is not disabled.
V-6754 Medium The IIS Internet Printing Protocol is not disabled.
V-26279 Medium Error logging must be enabled.
V-2259 Medium Web server system files will conform to minimum file permission requirements.
V-2256 Medium The access control files are owned by a privileged web server account.
V-2254 Medium Only web sites that have been fully reviewed and tested will exist on a production web server.
V-2255 Medium The web server’s htpasswd files (if present) will reflect proper ownership and permissions
V-2252 Medium Users other than from the Auditors group have greater than read access to log files.
V-2250 Medium Logs of web server access and errors will be established and maintained
V-13687 Medium Remote authors or content providers must have all files scanned for malware before uploading files to the Document Root directory.
V-13723 Medium The MaxRequestEntityAllowed metabase value must be defined.
V-13722 Medium The UrlSegmentMaxCount registry entry must be set properly.
V-13721 Medium The UriMaxUriBytes registry entry must be set properly.
V-13720 Medium The PercentUAllowed registry entry must be set properly.
V-13688 Medium Log file data must contain required data elements.
V-13689 Medium Access to the web server log files will be restricted to administrators, web administrators, and auditors.
V-13725 Medium The httpd.conf KeepAlive directive is not enabled.
V-13724 Medium The httpd.conf Timeout directive is not set properly.
V-2248 Medium Access to web administration tools is restricted to the web manager and the web manager’s designees.
V-13619 Medium The web server, although started by superuser or privileged account, is not run using a non- privileged account.
V-13613 Medium The site software used with the web server does not have all applicable security patches applied and documented.
V-2240 Medium The number of allowed simultaneous requests will be limited for web sites.
V-2243 Medium A private web server will be located on a separate controlled access subnet.
V-2242 Medium A public web server will be physically and logically isolated in accordance with the DoD Internet-NIPRNet DMZ STIG and the DoD Enclave STIG.
V-13738 Medium The httpd.conf LimitRequestFieldsize directive is set to unlimited.
V-13739 Medium The httpd.conf LimitRequestline directive is set to unlimited.
V-13730 Medium The httpd.conf MaxClients directive is not set properly.
V-13731 Medium The CGI-Bin directory or the directory that maintains CGI scripts is not the only directory to have the ExecCGI directive applied. .
V-13732 Medium The” –FollowSymLinks” directive is not used on all data directories.
V-13734 Medium The MultiViews directive is used.
V-13735 Medium The” -Indexes” directive is not used on all data directories not containing a default index page unless the mod_autoindex module is disabled.
V-13736 Medium The httpd.conf LimitRequestBody directive is set to unlimited.
V-13737 Medium The httpd.conf LimitRequestFields directive is set to unlimited.
V-13710 Medium An application pool’s pinging monitor must be enabled.
V-26294 Medium Web server status module must be disabled.
V-2270 Medium Anonymous FTP user access to interactive scripts is prohibited.
V-2271 Medium Monitoring software will include CGI or equivalent programs in the set of files which it checks.
V-2272 Medium PERL scripts must use the TAINT option.
V-91207 Medium Public web server resources must not be shared with private assets.
V-26299 Medium The web server must not be configured as a proxy server.
V-6531 Medium A web server that utilizes PKI as an authentication mechanism must utilize subscriber certificates issued from a DoD-authorized Certificate Authority.
V-26043 Medium The production web-site must configure the Maximum Query String limit.
V-2264 Medium Wscript.exe and Cscript.exe are accessible by users other than the SA and the web administrator.
V-2263 Medium A private web server will have a valid DoD server certificate.
V-2262 Medium A private web server will utilize TLS v 1.0 or greater.
V-2261 Medium A public web server will limit e-mail to outbound only.
V-2268 Medium The IUSR_machinename account has read access to the .inc files or their equivalent.
V-26285 Medium Active software modules must be minimized.
V-26287 Medium Web Distributed Authoring and Versioning (WebDAV) must be disabled.
V-26280 Medium The sites error logs must log the correct format.
V-26281 Medium System logging must be enabled.
V-26282 Medium The LogLevel directive must be enabled.
V-26323 Medium The web server must be configured to explicitly deny access to the OS root.
V-26322 Medium The ScoreBoard file must be properly secured.
V-60709 Medium The web server must remove all export ciphers from the cipher suite.
V-26327 Medium The URL-path name must be set to the file path name or the directory path name.
V-26326 Medium The web server must be configured to listen on a specific IP address and port.
V-26325 Medium The TRACE method must be disabled.
V-26324 Medium Web server options for the OS root must be disabled.
V-13620 Medium A private web server’s list of CAs in a trust hierarchy will lead to the DoD PKI Root CA, to a DoD-approved external certificate authority (ECA), or to a DoD-approved external partner.
V-13705 Medium The maximum number of requests an application pool can process must be set.
V-13704 Medium The Recycle Worker processes in minutes monitor must be set properly.
V-13707 Medium The maximum used memory monitor must be enabled.
V-13706 Medium The maximum virtual memory monitor must be enabled.
V-13700 Medium The File System Object component, is not required and is not disabled.
V-13703 Medium The website must have a unique application pool.
V-13709 Medium The maximum queue length for HTTP.sys must be managed.
V-13708 Medium The Idle Timeout monitor must be enabled.
V-26042 Medium The production web-site must limit the MaxURL.
V-26034 Medium The production web-site must configure the Global .NET Trust Level.
V-3333 Medium The web document (home) directory will be in a separate partition from the web server’s system files.
V-3330 Medium URLScan is not being used on the web server
V-26041 Medium The web-site must limit the number of bytes accepted in a request.
V-26046 Medium The production web-site must filter unlisted file extensions in URL requests.
V-26305 Medium The process ID (PID) file must be properly secured.
V-26044 Medium The web-site must not allow non-ASCII characters in URLs.
V-26302 Medium User specific directories must not be globally enabled.
V-26045 Medium The web-site must not allow double encoded URL requests.
V-13712 Medium An application pool’s rapid fail protection settings must be managed.
V-26026 Medium The production website must utilize SHA1 encryption for Machine Key.
V-13711 Medium An application pool’s rapid fail protection must be enabled.
V-13716 Medium The FavorUTF8 registry key must be set properly.
V-13717 Medium The MaxFieldLength registry entry must be set properly.
V-13714 Medium The AllowRestrictedChars registry key must be disabled.
V-13715 Medium The EnableNonUTF8 registry key must be disabled.
V-13718 Medium The MaxRequestBytes registry entry must be set properly.
V-13719 Medium The UrlSegmentMaxLength registry entry must be set properly.
V-13728 Medium The httpd.conf MinSpareServers directive is not set properly.
V-26393 Medium The ability to override the access configuration for the OS root directory must be disabled.
V-26396 Medium HTTP request methods must be limited.
V-2234 Medium A public web server’s resources (e.g., drives, folders, printers, etc.) will not be shared with private assets.
V-2235 Medium The service account ID used to run the web site will have its password changed at least annually.
V-2236 Medium Installation of compilers on production web server is prohibited.
V-2232 Medium The web server service password(s) must be entrusted to the SA or Web Manager.
V-6577 Medium A web server will be segregated from other services.
V-13727 Medium The httpd.conf StartServers directive is not set properly.
V-13726 Medium The httpd.conf KeepAliveTimeout directive is set to unlimited.
V-2229 Medium Interactive scripts used on a web server will have proper access controls.
V-2228 Medium The CGI script directory has improper access controls.
V-2226 Medium Web content directories anonymously shared via a network share.
V-13672 Medium The private web server will use an approved DoD certificate validation process.
V-25999 Medium Unspecified file extensions must not be allowed to execute on the production web server.
V-26368 Medium Automatic directory indexing must be disabled.
V-15334 Low Web sites will utilize ports, protocols, and services according to PPSM guidelines.
V-2257 Low Administrative users and groups that have access rights to the web server are documented.
V-2251 Low All utility programs, not necessary for operations, will be removed or disabled.
V-6724 Low Web server and/or operating system information will be protected.
V-2245 Low Each readable web document directory will contain either default, home, index, or equivalent file.
V-3963 Low Content Index Service indexes directories, other than web document directories.
V-2265 Low Java software installed on the production web server will be limited to class files and the JAVA virtual machine.
V-2260 Low A private web server will not respond to requests from public search engines.
V-13702 Low The Content Location header contains proprietary IP addresses.
V-26031 Low The production web-site must be configured to prevent detailed HTTP error pages from being sent to remote clients.
V-13729 Low The httpd.conf MaxSpareServers directive is not set properly.
V-6485 Low Web server content and configuration files are not part of a routine backup program in order to recover from file damage and system failure.
V-2230 Low Backup interactive scripts on the production web server are prohibited.
V-26011 Low Debug must be turned off on a production website.
V-6373 Low The required DoD banner page will be displayed to authenticated users accessing a DoD private web site.
V-26006 Low A global authorization rule to restrict access must exist on the web server.
V-25994 Low Directory Browsing must be disabled on the production web server.