UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The ISEC7 EMM Suite must remove any unnecessaryusers or groups that have permissions to the server.xml file in Apache Tomcat.


Overview

Finding ID Version Rule ID IA Controls Severity
V-224790 ISEC-06-551310 SV-224790r505933_rule Medium
Description
Tomcat uses a port (defaults to 8005) as a shutdown port. Someone could Telnet to the machine using this port and send the default command SHUTDOWN. Tomcat and all web apps would shut down in that case, which is a denial of service attack and would cause an unwanted service interruption.
STIG Date
ISEC7 Sphere Security Technical Implementation Guide 2020-09-04

Details

Check Text ( C-26481r461626_chk )
Verify unnecessaryusers or groups that have permissions to the Server.xml file in Apache Tomcat have been removed.

Browse to ProgramFiles\Isec7 EMM Suite\Tomcat\Conf and select Server.xml
Right click and select Properties.
Select the security tab and verify no unnecessaryaccount or groups have been granted permissions to the file.
Verify no unnecessaryusers or groups have permissions to the file.

If unnecessaryusers or groups that have permissions to the Server.xml file in Apache Tomcat have not been removed, this is a finding.
Fix Text (F-26469r461627_fix)
Log in to the ISEC7 EMM Suite server.
Browse to ProgramFiles\Isec7 EMM Suite\Tomcat\Conf and select Server.xml
Right click and select Properties.
Select the security tab and remove unnecessaryaccounts or groups that have been granted permissions to the Server.xml file.