CIS Apache Tomcat5.5/6.0 L1 v1.0

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: CIS Apache Tomcat5.5/6.0 L1 v1.0

Updated: 1/20/2021

Authority: CIS

Plugin: Unix

Revision: 1.28

Estimated Item Count: 50

Audit Items

DescriptionCategories
1.3.2 Disable Unused Connectors

CONFIGURATION MANAGEMENT

1.4.5 Disable client facing Stack Traces (Additional checks may be required)

SYSTEM AND INFORMATION INTEGRITY

1.4.5 Disable client facing Stack Traces (Check if error-page has an exception-type defined)

SYSTEM AND INFORMATION INTEGRITY

1.4.5 Disable client facing Stack Traces (Check if error-page has an location defined)

SYSTEM AND INFORMATION INTEGRITY

1.4.6 Turn off TRACE (check web.xml configuration files)

SYSTEM AND INFORMATION INTEGRITY

1.4.6 Turn off TRACE (verify if allowTrace is set to false)

SYSTEM AND INFORMATION INTEGRITY

1.5.1 Set a nondeterministic Shutdown command value.

CONFIGURATION MANAGEMENT

1.6.1 Restrict access to $CATALINA_HOME

CONFIGURATION MANAGEMENT

1.6.2 Restrict access to $CATALINA_BASE

CONFIGURATION MANAGEMENT

1.6.3 Restrict access to Tomcat configuration directory

CONFIGURATION MANAGEMENT

1.6.4 Restrict access to Tomcat logs directory

CONFIGURATION MANAGEMENT

1.6.5 Restrict access to Tomcat temp directory

CONFIGURATION MANAGEMENT

1.6.6 Restrict access to Tomcat binaries directory

CONFIGURATION MANAGEMENT

1.6.7 Restrict access to Tomcat web application directory

CONFIGURATION MANAGEMENT

1.6.8 Restrict access to Tomcat catalina.policy

CONFIGURATION MANAGEMENT

1.6.9 Restrict access to Tomcat catalina.properties

CONFIGURATION MANAGEMENT

1.6.10 Restrict access to Tomcat context.xml

CONFIGURATION MANAGEMENT

1.6.11 Restrict access to Tomcat logging.properties

CONFIGURATION MANAGEMENT

1.6.12 Restrict access to Tomcat server.xml

CONFIGURATION MANAGEMENT

1.6.13 Restrict access to Tomcat tomcat-users.xml

CONFIGURATION MANAGEMENT

1.6.14 Restrict access to Tomcat web.xml

CONFIGURATION MANAGEMENT

1.8.2 Ensure SSLEnabled is set to True for Sensitive Connectors

SYSTEM AND COMMUNICATIONS PROTECTION

1.8.2 Ensure SSLEnabled is set to True for Sensitive Connectors(verify SSLEnabled is set to true)

SYSTEM AND COMMUNICATIONS PROTECTION

1.8.3 Ensure scheme is set accurately

SYSTEM AND COMMUNICATIONS PROTECTION

1.8.4 Ensure secure is set to true only for SSL-enabled Connectors (verify secure is set to true)

SYSTEM AND COMMUNICATIONS PROTECTION

1.8.5 Ensure sslProtocol is set to TLS for Secure Connectors (verify sslProtocol is set to TLS)

SYSTEM AND COMMUNICATIONS PROTECTION

1.9.2 Specify file handler in logging.properties (check if java.util.logging.ConsoleHandler exists in web application)

AUDIT AND ACCOUNTABILITY

1.9.2 Specify file handler in logging.properties (check if java.util.logging.ConsoleHandler exists inin default)

AUDIT AND ACCOUNTABILITY

1.9.2 Specify file handler in logging.properties (check if java.util.logging.ConsoleHandler logging is enabled in web application)

AUDIT AND ACCOUNTABILITY

1.9.2 Specify file handler in logging.properties (check if java.util.logging.ConsoleHandler logging is enabled inin default)

AUDIT AND ACCOUNTABILITY

1.9.2 Specify file handler in logging.properties (check if org.apache.juli.FileHandler exists in web application)

AUDIT AND ACCOUNTABILITY

1.9.2 Specify file handler in logging.properties (check if org.apache.juli.FileHandler exists inin default)

AUDIT AND ACCOUNTABILITY

1.9.2 Specify file handler in logging.properties (check if org.apache.juli.FileHandler logging is enabled in web application)

AUDIT AND ACCOUNTABILITY

1.9.2 Specify file handler in logging.properties (check if org.apache.juli.FileHandler logging is enabled inin default)

AUDIT AND ACCOUNTABILITY

1.9.4 Ensure directory in context.xml is a secure location - configuration

AUDIT AND ACCOUNTABILITY

1.9.4 Ensure directory in context.xml is a secure location - permissions

CONFIGURATION MANAGEMENT

1.9.5 Ensure pattern in context.xml is correct

AUDIT AND ACCOUNTABILITY

1.9.6 Ensure directory in logging.properties is a secure location (check application log directory is secure)

CONFIGURATION MANAGEMENT

1.9.6 Ensure directory in logging.properties is a secure location (check log directory location)

AUDIT AND ACCOUNTABILITY

1.9.6 Ensure directory in logging.properties is a secure location (check prefix application name)

AUDIT AND ACCOUNTABILITY

1.10.1 Restrict runtime access to sensitive packages

ACCESS CONTROL

1.11.1 Starting Tomcat with Security Manager

CONFIGURATION MANAGEMENT

1.12.1 Ensure Web content directory is on a separate partition from the Tomcat system files (verify Web content directory)
1.12.4 Force SSL when accessing the manager application

SYSTEM AND COMMUNICATIONS PROTECTION

1.12.6 Enable strict servlet Compliance

CONFIGURATION MANAGEMENT

1.12.7 Turn off session facade recycling

CONFIGURATION MANAGEMENT

1.12.14 Do not allow symbolic linking

ACCESS CONTROL

1.12.15 Do not run applications as privileged

ACCESS CONTROL

1.12.16 Do not allow cross context requests

SYSTEM AND COMMUNICATIONS PROTECTION

CIS_v1.0.0_Apache_Tomcat_Level_1.audit Level 1