1.1 Ensure the Pre-Installation Planning Checklist Has Been Implemented

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Review and implement the following items as appropriate:
- Review and implement your organization's security policies as they relate to web security.
- Implement a secure network infrastructure by controlling access to/from your web server using firewalls, routers and switches.
- Harden the underlying operating system of the web server by minimizing listening network services, applying proper patches, and hardening the configurations as recommended in the appropriate Center for Internet Security benchmark for the platform.
- Implement central log monitoring processes.
- Implement a disk space monitoring process and log rotation mechanism.
- Educate developers about developing secure applications. http://www.owasp.org/ http://www.webappsec.org/
- Ensure the WHOIS Domain information registered for the web presence does not reveal sensitive personnel information, which may be leveraged for social engineering and other types of attacks.
- Ensure your Domain Name System (DNS) servers have been properly secured to prevent attacks, as recommended in the CIS BIND DNS benchmark.
- Implement intrusion detection technology, a web application firewall, or other similar technology to monitor attacks against the web server.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

See Also

https://workbench.cisecurity.org/files/2020

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-7

Plugin: Unix

Control ID: c541b3a29fccfef75d0cdb2c44babe327c88d95417e886af7a3bdff8b7f59509