STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to HPE 3PAR SSMC Web Server Security Technical Implementation Guide

V-255264

CAT II (Medium)

SSMC web server application, libraries, and configuration files must only be accessible to privileged users.

Rule ID

SV-255264r961041_rule

STIG

HPE 3PAR SSMC Web Server Security Technical Implementation Guide

Version

V2R1

CCIs

CCI-000186CCI-001082CCI-001813

Discussion

A web server can be modified through parameter modification, patch installation, upgrades to the web server or modules, and security parameter changes. With each of these changes, there is the potential for an adverse effect such as a DoS, web server instability, or hosted application instability. To limit changes to the web server and limit exposure to any adverse effects from the changes, files such as the web server application files, libraries, and configuration files must have permissions and ownership set properly to only allow privileged users access. Satisfies: SRG-APP-000176-WSR-000096, SRG-APP-000380-WSR-000072, SRG-APP-000211-WSR-000030

Check Content

Verify that SSMC is configured to protect web server configuration files and logs from unauthorized access by executing command that enables stricter file permission:

$ sudo /ssmc/bin/config_security.sh -o strict_file_permission -a status
Strict file permission is set

If the output does not read "Strict file permission is set", this is a finding.

Fix Text

Configure SSMC to protect web server configuration files and logs from unauthorized access by executing command that enables stricter file permission (cannot be undone): 

$ sudo /ssmc/bin/config_security.sh -f -o strict_file_permission -a set