Details
The Apache web server can be modified through parameter modification, patch installation, upgrades to the Apache web server or modules, and security parameter changes. With each of these changes, there is the potential for an adverse effect such as a denial of service (DoS), Apache web server instability, or hosted application instability.
To limit changes to the Apache web server and limit exposure to any adverse effects from the changes, files such as the Apache web server application files, libraries, and configuration files must have permissions and ownership set properly to only allow privileged users access.
NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.
Solution
Ensure non-administrators are not allowed access to the directory tree, the shell, or other operating system functions and utilities.
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Configuration Management.This control applies to the following type of system Unix.
References
- 800-53|CM-5(1)
- CAT|II
- CCI|CCI-001813
- Rule-ID|SV-214299r612241_rule
- STIG-ID|AS24-U2-000780
- STIG-Legacy|SV-102907
- STIG-Legacy|V-92819
- Vuln-ID|V-214299