Solved

NIST, CIS & SANS hardening guides for JBOSS, Weblogic, Websphere, IIS

Posted on 2016-07-20
1
393 Views
Last Modified: 2016-07-27
0
Comment
Question by:sunhux
1 Comment
 
LVL 62

Accepted Solution

by:
btan earned 500 total points
ID: 41721259
jboss -
there are no published CIS benchmarks for Red Hat JBoss Web Server (Tomcat or Apache). There are CIS benchmarks available for community version of Tomcat 5/6.x and Apache 2.2, however, those reports would not be accurate reflections of the Red Hat JBoss Web Server components.
https://access.redhat.com/solutions/1451973

if it is jboss app server - closer found is nist Checklist Details for JBoss Enterprise Application Platform (EAP) 5.x @ https://web.nvd.nist.gov/view/ncp/repository/checklistDetail?id=430

another disa STIG (Red Hat JBoss Enterprise Application Platform (EAP) 6.3 STIG Version 1, Release 1) @ http://iase.disa.mil/stigs/app-security/app-servers/Pages/jboss.aspx


Websphere - nist (BEA WebLogic Server 7.0 sp6 Sun JRE 5.0 Update 4 ) Checklist Details for Application Services STIG Checklist Version 1 Release 1.1 @ https://web.nvd.nist.gov/view/ncp/repository/checklistDetail?id=365


Weblogic - nist Checklist Details for Oracle WebLogic Server 12c STIG Ver 1, Rel 2  @ https://web.nvd.nist.gov/view/ncp/repository/checklistDetail?id=670

disa STIG (Oracle WebLogic Server 12c STIG - Ver 1, Rel 2) @ http://iase.disa.mil/stigs/app-security/app-servers/Pages/general.aspx


iis - nist version is latest to Checklist Details for CIS Microsoft IIS 8 Benchmark 1.4.0 @ https://web.nvd.nist.gov/view/ncp/repository/checklistDetail?id=613
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

With healthcare moving into the digital age with things like Healthcare.gov, the digitization of patient records and video conferencing with patients, data has a much greater chance of being exposed than ever before.
Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report (http://www.cybersecurityventures.com/cybersecurity-market-report), worldwide spending on cybersecurity …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question