STIGQter STIGQter: STIG Summary: Application Security and Development Security Technical Implementation Guide Version: 5 Release: 1 Benchmark Date: 23 Oct 2020:

The application must ensure messages are encrypted when the SessionIndex is tied to privacy data.

DISA Rule

SV-222406r508029_rule

Vulnerability Number

V-222406

Group Title

SRG-APP-000014

Rule Version

APSC-DV-000260

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Encrypt messages when the SessionIndex is tied to privacy data.

Check Contents

Ask the application representative for the design document.

Review the design document for web services using SAML assertions.

If the application does not utilize SAML assertions, this check is not applicable.

Examine the contents of a SOAP message using a SessionIndex in the SAML element AuthnStatement. Verify the information which is tied to the SessionIndex.

If the SessionIndex is tied to privacy information, and it is not encrypted, this is a finding.

Vulnerability Number

V-222406

Documentable

False

Rule Version

APSC-DV-000260

Severity Override Guidance

Ask the application representative for the design document.

Review the design document for web services using SAML assertions.

If the application does not utilize SAML assertions, this check is not applicable.

Examine the contents of a SOAP message using a SessionIndex in the SAML element AuthnStatement. Verify the information which is tied to the SessionIndex.

If the SessionIndex is tied to privacy information, and it is not encrypted, this is a finding.

Check Content Reference

M

Target Key

4093

Comments