STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Web Server Security Requirements Guide

V-206428

CAT II (Medium)

The web server must prohibit or restrict the use of nonsecure or unnecessary ports, protocols, modules, and/or services.

Rule ID

SV-206428r961470_rule

STIG

Web Server Security Requirements Guide

Version

V4R4

CCIs

CCI-001762

Discussion

Web servers provide numerous processes, features, and functionalities that utilize TCP/IP ports. Some of these processes may be deemed unnecessary or too unsecure to run on a production system. The web server must provide the capability to disable or deactivate network-related services that are deemed to be non-essential to the server mission, are too unsecure, or are prohibited by the PPSM CAL and vulnerability assessments.

Check Content

Review the web server documentation and deployment configuration to determine which ports and protocols are enabled.

Verify that the ports and protocols being used are permitted, necessary for the operation of the web server and the hosted applications and are secure for a production system.

If any of the ports or protocols are not permitted, are nonsecure or are not necessary for web server operation, this is a finding.

Fix Text

Configure the web server to disable any ports or protocols that are not permitted, are nonsecure for a production web server or are not necessary for web server operation.