UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

All web server files must be verified for their integrity (e.g., checksums and hashes) before becoming part of the production web server.


Overview

Finding ID Version Rule ID IA Controls Severity
V-55983 SRG-APP-000131-WSR-000051 SV-70237r1_rule Medium
Description
Being able to verify that a patch, upgrade, certificate, etc., being added to the web server is unchanged from the producer of the file is essential for file validation and non-repudiation of the information. The web server or hosting system must have a mechanism to verify that files, before installation, are valid. Examples of validation methods are sha1 and md5 hashes and checksums.
STIG Date
Web Server Security Requirements Guide 2014-11-17

Details

Check Text ( C-56553r2_chk )
Review the web server documentation and deployment configuration to determine if the web server validates files before the files are implemented into the running configuration.

If the web server does not meet this requirement and an external facility is not available for use, this is a finding.
Fix Text (F-60861r1_fix)
Configure the web server to verify object integrity before becoming part of the production web server or utilize an external tool designed to meet this requirement.