1. Home
  2. Security Hardening
  3. DISA STIG Apache Server 2.4 Unix Server V2R5 Middleware
  4. AS24-U1-000670 – The Apache web server must restrict inbound connections from nonsecure zones.

AS24-U1-000670 – The Apache web server must restrict inbound connections from nonsecure zones.

Details

Remote access to the Apache web server is any access that communicates through an external, non-organization-controlled network. Remote access can be used to access hosted applications or to perform management functions.

A web server can be accessed remotely and must be capable of restricting access from what the DoD defines as nonsecure zones. Nonsecure zones are defined as any IP, subnet, or region that is defined as a threat to the organization. The nonsecure zones must be defined for public web servers logically located in a DMZ, as well as private web servers with perimeter protection devices. By restricting access from nonsecure zones, through the internal web server access list, the Apache web server can stop or slow denial-of-service (DoS) attacks on the web server.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Configure the ‘http.conf’ file to include restrictions.

Example:


Require not ip 192.168.205
Require not host phishers.example.com

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Access Control.This control applies to the following type of system Unix.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles