STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Web Server Security Requirements Guide

V-206384

CAT II (Medium)

The web server must protect system resources and privileged operations from hosted applications.

Rule ID

SV-206384r960963_rule

STIG

Web Server Security Requirements Guide

Version

V4R4

CCIs

CCI-000381

Discussion

A web server may host one too many applications. Each application will need certain system resources and privileged operations to operate correctly. The web server must be configured to contain and control the applications and protect the system resources and privileged operations from those not needed by the application for operation. Limiting the application will confine the potential harm a compromised application could cause to a system.

Check Content

Review the web server documentation and configuration to determine the access to server resources given to hosted applications.

If hosted applications have access to more system resources than needed for operation, this is a finding.

Fix Text

Configure the privileges given to hosted applications to the minimum required for application operation.