UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Remote access to the web server must follow access policy or work in conjunction with enterprise tools designed to enforce policy requirements.


Overview

Finding ID Version Rule ID IA Controls Severity
V-55953 SRG-APP-000315-WSR-000003 SV-70207r1_rule Medium
Description
Remote access to the web server is any access that communicates through an external, non-organization-controlled network. Remote access can be used to access hosted applications or to perform management functions. A web server can be accessed remotely and must be able to enforce remote access policy requirements or work in conjunction with enterprise tools designed to enforce policy requirements. Examples of the web server enforcing a remote access policy are implementing IP filtering rules, using https instead of http for communication, implementing secure tokens, and validating users.
STIG Date
Web Server Security Requirements Guide 2014-11-17

Details

Check Text ( C-56523r2_chk )
Review the web server product documentation and deployed configuration to determine if the server or an enterprise tool is enforcing the organization's requirements for remote connections.

If the web server is not configured to enforce these requirements and an enterprise tool is not in place, this is a finding.
Fix Text (F-60831r2_fix)
Configure the web server to enforce the remote access policy or to work with an enterprise tool designed to enforce the policy.