Skip to main content
CUI

STIG Rule - V-206350

V-206350

SV-206350r960735_rule

CAT II

The web server must limit the number of allowed simultaneous session requests.

From: Web Server Security Requirements Guide (V4R4)

Description

<VulnDiscussion>Web server management includes the ability to control the number of users and user sessions that utilize a web server. Limiting the number of allowed users and sessions per user is helpful in limiting risks related to several types of Denial of Service attacks. Although there is some latitude concerning the settings themselves, the settings should follow DoD-recommended values, but the settings should be configurable to allow for future DoD direction. While the DoD will specify recommended values, the values can be adjusted to accommodate the operational requirement of a given system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>

Check Procedure

Review the web server documentation and configuration to determine if the number of simultaneous sessions is limited. If the parameter is not configured or is unlimited, this is a finding.

Fix Text

Configure the web server to limit the number of concurrent sessions.

CCI Reference

CCI-000054
Created
2026-04-07 20:08:40
Last Updated
2026-04-07 20:08:40
CUI