1.1 Ensure the Pre-Installation Planning Checklist Has Been Implemented | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
1.2 Ensure the Server Is Not a Multi-Use System | CONFIGURATION MANAGEMENT |
1.3 Ensure Apache Is Installed From the Appropriate Binaries | CONFIGURATION MANAGEMENT |
2.1 Ensure Only Necessary Authentication and Authorization Modules Are Enabled | CONFIGURATION MANAGEMENT |
2.2 Ensure the Log Config Module Is Enabled | AUDIT AND ACCOUNTABILITY |
2.3 Ensure the WebDAV Modules Are Disabled | CONFIGURATION MANAGEMENT |
2.4 Ensure the Status Module Is Disabled | CONFIGURATION MANAGEMENT |
2.5 Ensure the Autoindex Module Is Disabled | CONFIGURATION MANAGEMENT |
2.6 Ensure the Proxy Modules Are Disabled if not in use | CONFIGURATION MANAGEMENT |
2.7 Ensure the User Directories Module Is Disabled | CONFIGURATION MANAGEMENT |
2.8 Ensure the Info Module Is Disabled | CONFIGURATION MANAGEMENT |
2.9 Ensure the Basic and Digest Authentication Modules are Disabled | CONFIGURATION MANAGEMENT |
3.1 Ensure the Apache Web Server Runs As a Non-Root User | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
3.2 Ensure the Apache User Account Has an Invalid Shell | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
3.3 Ensure the Apache User Account Is Locked | ACCESS CONTROL |
3.4 Ensure Apache Directories and Files Are Owned By Root | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
3.5 Ensure the Group Is Set Correctly on Apache Directories and Files | ACCESS CONTROL, MEDIA PROTECTION |
3.6 Ensure Other Write Access on Apache Directories and Files Is Restricted | ACCESS CONTROL, MEDIA PROTECTION |
3.7 Ensure the Core Dump Directory Is Secured | ACCESS CONTROL, MEDIA PROTECTION |
3.8 Ensure the Lock File Is Secured | ACCESS CONTROL, MEDIA PROTECTION |
3.9 Ensure the Pid File Is Secured | ACCESS CONTROL, MEDIA PROTECTION |
3.10 Ensure the ScoreBoard File Is Secured | ACCESS CONTROL, MEDIA PROTECTION |
3.11 Ensure Group Write Access for the Apache Directories and Files Is Properly Restricted | ACCESS CONTROL, MEDIA PROTECTION |
3.12 Ensure Group Write Access for the Document Root Directories and Files Is Properly Restricted | ACCESS CONTROL, MEDIA PROTECTION |
3.13 Ensure Access to Special Purpose Application Writable Directories is Properly Restricted | ACCESS CONTROL, MEDIA PROTECTION |
4.1 Ensure Access to OS Root Directory Is Denied By Default | ACCESS CONTROL, MEDIA PROTECTION |
4.2 Ensure Appropriate Access to Web Content Is Allowed | ACCESS CONTROL, MEDIA PROTECTION |
4.3 Ensure OverRide Is Disabled for the OS Root Directory | ACCESS CONTROL, MEDIA PROTECTION |
4.4 Ensure OverRide Is Disabled for All Directories | ACCESS CONTROL, MEDIA PROTECTION |
5.1 Ensure Options for the OS Root Directory Are Restricted | ACCESS CONTROL |
5.2 Ensure Options for the Web Root Directory Are Restricted | ACCESS CONTROL |
5.3 Ensure Options for Other Directories Are Minimized | ACCESS CONTROL |
5.4 Ensure Default HTML Content Is Removed | CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION |
5.5 Ensure the Default CGI Content printenv Script Is Removed | CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION |
5.6 Ensure the Default CGI Content test-cgi Script Is Removed | CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION |
5.7 Ensure HTTP Request Methods Are Restricted | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
5.8 Ensure the HTTP TRACE Method Is Disabled | CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION |
5.9 Ensure Old HTTP Protocol Versions Are Disallowed | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
5.10 Ensure Access to .ht* Files Is Restricted | CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION |
5.11 Ensure Access to .git Files Is Restricted | CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION |
5.12 Ensure Access to .svn Files Is Restricted | CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION |
6.1 Ensure the Error Log Filename and Severity Level Are Configured Correctly | AUDIT AND ACCOUNTABILITY |
6.3 Ensure the Server Access Log Is Configured Correctly | AUDIT AND ACCOUNTABILITY |
6.4 Ensure Log Storage and Rotation Is Configured Correctly | AUDIT AND ACCOUNTABILITY |
6.5 Ensure Applicable Patches Are Applied | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
7.1 Ensure mod_ssl and/or mod_nss Is Installed | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
7.2 Ensure a Valid Trusted Certificate Is Installed | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
7.3 Ensure the Server's Private Key Is Protected | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
7.4 Ensure the TLSv1.0 and TLSv1.1 Protocols are Disabled | CONFIGURATION MANAGEMENT |
7.5 Ensure Weak SSL/TLS Ciphers Are Disabled | CONFIGURATION MANAGEMENT |