SV-222936r615938_rule
V-222936
SRG-APP-000033-AS-000024
TCAT-AS-000110
CAT II
10
Refer to the vulnerability discussion of this requirement for additional information. Install the application in a test environment and determine the application access requirements. Test and document the Java Security Manager policy and then transfer the JSM policy to the $CATALINA_BASE/conf/catalina.properties file. If operating multiple instances of Tomcat, use $CATALINA_BASE in place of $CATALINA_HOME as per standard Tomcat practice.
As an admin user on the Tomcat server, modify the /etc/systemd/system/tomcat.service file and set the "ExecStart" parameter to read:
"ExecStart=/opt/tomcat/bin/startup.sh -security"
sudo systemctl restart tomcat
sudo systemctl daemon-reload
Review system documentation. Identify the tomcat systemd startup file which for STIG purposes is called "tomcat.service" and can be viewed as a link in the /etc/systemd/system/ folder.
Run the following command:
sudo cat /etc/systemd/system/tomcat.service |grep -i security
If there is a documented and approved risk acceptance for not operating the Security Manager, the finding can be reduced to a CAT III.
If the ExecStart parameter does not include the -security flag, this is a finding.
V-222936
False
TCAT-AS-000110
Review system documentation. Identify the tomcat systemd startup file which for STIG purposes is called "tomcat.service" and can be viewed as a link in the /etc/systemd/system/ folder.
Run the following command:
sudo cat /etc/systemd/system/tomcat.service |grep -i security
If there is a documented and approved risk acceptance for not operating the Security Manager, the finding can be reduced to a CAT III.
If the ExecStart parameter does not include the -security flag, this is a finding.
M
4094