Logo
Main site Submit a request Sign in
  1. Help Central | G5 Cyber Security
  2. Security Hardening
  3. TNS Best Practices Jetty 9 v1.0.0

TNS Best Practices Jetty 9 v1.0.0

Follow New articles New articles and comments
  • - Management IP - .htacess exists
  • - Management IP - review $jetty_home/contexts xml file
  • access Control - JAAS
  • access Control - security Realms
  • Authentication
  • configure log file size limit - org.eclipse.jetty.server.handler.RequestLogHandler
  • configure log file size limit - Settings
  • Encryption
  • Information Leakage
  • Remove extraneous files and directories - $JETTY_BASE/webapps/balancer
  • Remove extraneous files and directories - $JETTY_BASE/webapps/doc
  • Remove extraneous files and directories - $JETTY_BASE/webapps/examples
  • Restrict access to $JETTY_HOME - mode
  • Restrict access to $JETTY_HOME - owner
  • Restrict access to binaries directory - mode
  • Restrict access to binaries directory - owner
  • Restrict access to context.xml - mode
  • Restrict access to context.xml - owner
  • Restrict access to JETTY.policy - mode
  • Restrict access to JETTY.policy - owner
  • Restrict access to JETTY.properties - mode
  • Restrict access to JETTY.properties - owner
  • Restrict access to logging.properties - mode
  • Restrict access to logging.properties - owner
  • Restrict access to logs directory - mode
  • Restrict access to logs directory - owner
  • Restrict access to server.xml - mode
  • Restrict access to server.xml - owner
  • Restrict access to temp directory - mode
  • Restrict access to temp directory - owner
  • 1
  • 2
  • ›
  • »

© Help Central | G5 Cyber Security