STIGQter STIGQter: STIG Summary: Application Security and Development Security Technical Implementation Guide Version: 5 Release: 1 Benchmark Date: 23 Oct 2020:

The application must provide audit record generation capability for the destruction of session IDs.

DISA Rule

SV-222442r508029_rule

Vulnerability Number

V-222442

Group Title

SRG-APP-000089

Rule Version

APSC-DV-000630

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Enable session ID destruction event auditing.

Check Contents

Access the management interface for the application or configuration file and evaluate the log/audit management settings.

Determine if the setting that enables session ID destruction event auditing is activated.

Terminate a user session within the application and review the logs to ensure the session destruction event was recorded.

If the application is not configured to log session ID destruction events, or if the application has no means to enable auditing of session ID destruction events, this is a finding.

If a web-based application delegates session ID destruction to an application server, this is not a finding.

If the application generates audit logs by default when session IDs are destroyed, and that behavior cannot be disabled, this is not a finding.

Vulnerability Number

V-222442

Documentable

False

Rule Version

APSC-DV-000630

Severity Override Guidance

Access the management interface for the application or configuration file and evaluate the log/audit management settings.

Determine if the setting that enables session ID destruction event auditing is activated.

Terminate a user session within the application and review the logs to ensure the session destruction event was recorded.

If the application is not configured to log session ID destruction events, or if the application has no means to enable auditing of session ID destruction events, this is a finding.

If a web-based application delegates session ID destruction to an application server, this is not a finding.

If the application generates audit logs by default when session IDs are destroyed, and that behavior cannot be disabled, this is not a finding.

Check Content Reference

M

Target Key

4093

Comments