STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to ISEC7 Sphere Security Technical Implementation Guide

V-224789

CAT II (Medium)

The Apache Tomcat shutdown port must be disabled.

Rule ID

SV-224789r1013876_rule

STIG

ISEC7 Sphere Security Technical Implementation Guide

Version

V3R1

CCIs

CCI-001813

Discussion

Tomcat uses a port (defaults to 8005) as a shutdown port. Someone could Telnet to the machine using this port and send the default command SHUTDOWN. Tomcat and all web apps would shut down in that case, which is a denial-of-service attack and would cause an unwanted service interruption.

Check Content

Verify the shutdown port is disabled.

Log in to the SPHERE server.
Browse to Program Files\Isec7 SPHERE\Tomcat\Conf.
Open the server.xml with Notepad.exe.
Select Edit >> Find, and then search for "Shutdown".
Verify that the shutdown port has been disabled with entry below:

shutdown="-1"

If the shutdown port has not been disabled, this is a finding.

Fix Text

Log in to the SPHERE server.
Browse to Program Files\Isec7 SPHERE\Tomcat\Conf.
Open the server.xml with Notepad.exe.
Select Edit >> Find, and then search for "Shutdown".
Change the shutdown to "-1".

example:  shutdown=-1

Save the file and restart the Isec7 SPHERE Web service with the services.msc.