STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Web Server Security Requirements Guide

V-206393

CAT II (Medium)

Web server accounts accessing the directory tree, the shell, or other operating system functions and utilities must only be administrative accounts.

Rule ID

SV-206393r1138072_rule

STIG

Web Server Security Requirements Guide

Version

V4R4

CCIs

CCI-001082

Discussion

As a rule, accounts on a web server are to be kept to a minimum. Only administrators, web managers, developers, auditors, and web authors require accounts on the machine hosting the web server. The resources to which these accounts have access must also be closely monitored and controlled. Only the system administrator needs access to all the system's capabilities, while the web administrator and associated staff require access and control of the web content and web server configuration files. This requirement also applies to Zero Trust initiatives.

Check Content

Review the web server documentation and configuration to determine what web server accounts are available on the hosting server.

If nonprivileged web server accounts are available with access to functions, directories, or files not needed for the role of the account, this is a finding.

Fix Text

Limit the functions, directories, and files that are accessible by each account and role to administrative accounts and remove or modify nonprivileged account access.