STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Apache Server 2.4 Windows Site Security Technical Implementation Guide

V-214390

CAT II (Medium)

The Apache web server must prohibit or restrict the use of nonsecure or unnecessary ports, protocols, modules, and/or services.

Rule ID

SV-214390r1192950_rule

STIG

Apache Server 2.4 Windows Site Security Technical Implementation Guide

Version

V2R3

CCIs

CCI-001762, CCI-000366

Discussion

Web servers provide numerous processes, features, and functionalities that use TCP/IP ports. Some of these processes may be deemed unnecessary or too unsecure to run on a production system. The web server must provide the capability to disable or deactivate network-related services that are deemed nonessential to the server mission, are too unsecure, or are prohibited by the Ports, Protocols, and Services Management (PPSM) Category Assurance List (CAL) and vulnerability assessments. Configuring the web server to implement organizationwide security implementation guides and security checklists guarantees compliance with federal standards and establishes a common security baseline across the DOD that reflects the most restrictive security posture consistent with operational requirements. Satisfies: SRG-APP-000516-WSR-000174, SRG-APP-000383-WSR-000175

Check Content

Review the website documentation and deployment configuration to determine which ports and protocols are enabled.
 
Verify the ports and protocols being used are permitted, are necessary for the operation of the web server and the hosted applications, and are secure for a production system.

Review both the <'INSTALLED PATH'>\conf\httpd.conf and the  <'INSTALLED PATH'>\conf\extra\httpd-ssl.conf files.
 
Verify only the listener for IANA well-known ports for HTTP and HTTPS  (80 and 443) are in use.
 
If any of the ports or protocols are not permitted, are nonsecure, or are not necessary for website operation, this is a finding.

Fix Text

Ensure the website enforces the use of IANA well-known ports for HTTP and HTTPS.