Details
Extraneous services and applications running on an application server expands the attack surface and increases risk to the application server. Securing any server involves identifying and removing any unnecessary services and, in the case of an application server, unnecessary and/or unapproved applications.
NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.
Solution
Identify, authorize, and document all applications that are deployed to the application server. Remove unauthorized applications.
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Configuration Management.This control applies to the following type of system Unix.
References
- 800-53|CM-7a.
- CAT|II
- CCI|CCI-000381
- Rule-ID|SV-213524r615939_rule
- STIG-ID|JBOS-AS-000250
- STIG-Legacy|SV-76763
- STIG-Legacy|V-62273
- Vuln-ID|V-213524