UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The web server must protect system resources and privileged operations from hosted applications.


Overview

Finding ID Version Rule ID IA Controls Severity
V-41703 SRG-APP-000141-WSR-000086 SV-54280r2_rule Medium
Description
A web server may host one too many applications. Each application will need certain system resources and privileged operations to operate correctly. The web server must be configured to contain and control the applications and protect the system resources and privileged operations from those not needed by the application for operation. Limiting the application will confine the potential harm a compromised application could cause to a system.
STIG Date
Web Server Security Requirements Guide 2014-11-17

Details

Check Text ( C-48100r2_chk )
Review the web server documentation and configuration to determine the access to server resources given to hosted applications.

If hosted applications have access to more system resources than needed for operation, this is a finding.
Fix Text (F-47162r2_fix)
Configure the privileges given to hosted applications to the minimum required for application operation.