STIGQter STIGQter: STIG Summary: Application Security and Development Security Technical Implementation Guide Version: 5 Release: 1 Benchmark Date: 23 Oct 2020:

The application must electronically verify Personal Identity Verification (PIV) credentials from other federal agencies.

DISA Rule

SV-222558r508029_rule

Vulnerability Number

V-222558

Group Title

SRG-APP-000403

Rule Version

APSC-DV-001890

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the application to verify the PIV credentials presented when utilizing authentication provided by Federal (Non-DoD) agencies.

Check Contents

Review the application documentation and interview the application administrator to identify application access methods.

If the application is not PK-enabled due to the hosted data being publicly releasable, this check is not applicable.

If the application is only deployed to SIPRNet, this requirement is not applicable.

If the application is not intended to be available to Federal government (non-DoD) partners this requirement is not applicable.

Ask the application administrator to demonstrate how the application is configured to verify the PIV credentials from other agencies when they are presented as an authentication token.

If the application is required to provide authenticated access to Federal agencies and it does not verify the PIV, this is a finding.

Vulnerability Number

V-222558

Documentable

False

Rule Version

APSC-DV-001890

Severity Override Guidance

Review the application documentation and interview the application administrator to identify application access methods.

If the application is not PK-enabled due to the hosted data being publicly releasable, this check is not applicable.

If the application is only deployed to SIPRNet, this requirement is not applicable.

If the application is not intended to be available to Federal government (non-DoD) partners this requirement is not applicable.

Ask the application administrator to demonstrate how the application is configured to verify the PIV credentials from other agencies when they are presented as an authentication token.

If the application is required to provide authenticated access to Federal agencies and it does not verify the PIV, this is a finding.

Check Content Reference

M

Target Key

4093

Comments