OH12-1X-000210 - A private OHS installation must be located on a separate controlled access subnet.

Information

Private web servers, which host sites that serve controlled access data, must be protected from outside threats in addition to insider threats. Insider threat may be accidental or intentional but, in either case, can cause a disruption in service of the web server. To protect the private web server from these threats, it must be located on a separate controlled access subnet and must not be a part of the public DMZ that houses the public web servers. It also cannot be located inside the enclave as part of the local general population LAN.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

1. Relocate the OHS server to be on a local subnet, isolated from the DMZ.

2. Remove access to the OHS server from the LAN's general population.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_HTTP_Server_12-1-3_V2R2_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-221448r879887_rule, STIG-ID|OH12-1X-000210, STIG-Legacy|SV-79149, STIG-Legacy|V-64659, Vuln-ID|V-221448

Plugin: Unix

Control ID: 88921fe26f71b49159e60e53b2581bec8a666709333b4a4df736d3e358470ef2