WG440 W22 - Monitoring software must include CGI or equivalent programs in its scope.

Information

By their very nature, CGI type files permit the anonymous web user to interact with data and perhaps store data on the web server. In many cases, CGI scripts exercise system-level control over the server's resources. These files make appealing targets for the malicious user. If these files can be modified or exploited, the web server can be compromised. These files must be monitored by a security tool that reports unauthorized changes to these files.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Use a monitoring tool to monitor changes to the CGI or equivalent directory. This can be done with something as simple as a script or batch file that would identify a change in the file.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Apache_2-2_WIN_V1R13_STIG.zip

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-4, CAT|II, Rule-ID|SV-33089r2_rule, STIG-ID|WG440_W22, Vuln-ID|V-2271

Plugin: Windows

Control ID: d62ba546a13327d3f103c5355b3a0a1b466246c85ff5711b2a0a83a70b85ab04