2.5 Disable client facing Stack Traces | CONFIGURATION MANAGEMENT |
2.6 Turn off TRACE | CONFIGURATION MANAGEMENT |
3.1 Set a nondeterministic Shutdown command value | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
4.1 Restrict access to $CATALINA_HOME | ACCESS CONTROL, MEDIA PROTECTION |
4.2 Restrict access to $CATALINA_BASE | ACCESS CONTROL, MEDIA PROTECTION |
4.3 Restrict access to Tomcat configuration directory | ACCESS CONTROL, MEDIA PROTECTION |
4.4 Restrict access to Tomcat logs directory | ACCESS CONTROL, MEDIA PROTECTION |
4.5 Restrict access to Tomcat temp directory | ACCESS CONTROL, MEDIA PROTECTION |
4.6 Restrict access to Tomcat binaries directory | CONFIGURATION MANAGEMENT |
4.7 Restrict access to Tomcat web application directory | ACCESS CONTROL, MEDIA PROTECTION |
4.8 Restrict access to Tomcat catalina.properties | ACCESS CONTROL, MEDIA PROTECTION |
4.9 Restrict access to Tomcat catalina.policy | ACCESS CONTROL, MEDIA PROTECTION |
4.10 Restrict access to Tomcat context.xml | ACCESS CONTROL, MEDIA PROTECTION |
4.11 Restrict access to Tomcat logging.properties | ACCESS CONTROL, MEDIA PROTECTION |
4.12 Restrict access to Tomcat server.xml | ACCESS CONTROL, MEDIA PROTECTION |
4.13 Restrict access to Tomcat tomcat-users.xml | ACCESS CONTROL, MEDIA PROTECTION |
4.14 Restrict access to Tomcat web.xml | ACCESS CONTROL, MEDIA PROTECTION |
4.15 Restrict access to jaspic-providers.xml | ACCESS CONTROL, MEDIA PROTECTION |
6.2 Ensure SSLEnabled is set to True for Sensitive Connectors | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
6.3 Ensure scheme is set accurately | CONFIGURATION MANAGEMENT |
6.4 Ensure secure is set to true only for SSL-enabled Connectors | SYSTEM AND COMMUNICATIONS PROTECTION |
6.5 Ensure 'sslProtocol' is Configured Correctly for Secure Connectors | SYSTEM AND COMMUNICATIONS PROTECTION |
7.2 Specify file handler in logging.properties files | AUDIT AND ACCOUNTABILITY |
7.4 Ensure directory in context.xml is a secure location | ACCESS CONTROL, MEDIA PROTECTION |
7.5 Ensure pattern in context.xml is correct | AUDIT AND ACCOUNTABILITY |
7.6 Ensure directory in logging.properties is a secure location | ACCESS CONTROL, MEDIA PROTECTION |
8.1 Restrict runtime access to sensitive packages | ACCESS CONTROL, MEDIA PROTECTION |
10.1 Ensure Web content directory is on a separate partition from the Tomcat system files | CONFIGURATION MANAGEMENT, MAINTENANCE |
10.2 Restrict access to the web administration application | ACCESS CONTROL |
10.4 Force SSL when accessing the manager application via HTTP | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
10.7 Turn off session facade recycling | CONFIGURATION MANAGEMENT |
10.12 Do not allow symbolic linking | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
10.13 Do not run applications as privileged | ACCESS CONTROL |
10.14 Do not allow cross context requests | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
10.16 Enable memory leak listener | CONFIGURATION MANAGEMENT |
10.17 Setting Security Lifecycle Listener | ACCESS CONTROL |
10.18 Use the logEffectiveWebXml and metadata-complete settings for deploying applications in production | AUDIT AND ACCOUNTABILITY |
10.19 Ensure Manager Application Passwords are Encrypted | IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
CIS_Apache_Tomcat_10.1_v1.0.0_L1.audit from CIS Apache Tomcat 10.1 Benchmark v1.0.0 | |