STIGQter STIGQter: STIG Summary: Application Security and Development Security Technical Implementation Guide Version: 5 Release: 1 Benchmark Date: 23 Oct 2020:

The application must conform to FICAM-issued profiles.

DISA Rule

SV-222560r508029_rule

Vulnerability Number

V-222560

Group Title

SRG-APP-000405

Rule Version

APSC-DV-001910

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the application to conform to FICAM-issued technical profiles when providing services that rely on external (Federal Government) identity providers.

Check Contents

Review the application documentation and interview the application administrator to identify application access methods.

If the application is not PK-enabled due to the hosted data being publicly releasable, this check is not applicable.

If the application is only deployed to SIPRNet, this requirement is not applicable.

If the application is not intended to be available to Federal government partners this requirement is not applicable.

This requirement applies to DoD service providers who are relying parties of external (Federal Government) identity providers.

Ask the application administrator to demonstrate how the application conforms to FICAM issued profiles such as SAML or OPENID.

If the application is designed to be a service provider utilizing an external identify provider and doesn't conform to FICAM-issued profiles, this is a finding.

Vulnerability Number

V-222560

Documentable

False

Rule Version

APSC-DV-001910

Severity Override Guidance

Review the application documentation and interview the application administrator to identify application access methods.

If the application is not PK-enabled due to the hosted data being publicly releasable, this check is not applicable.

If the application is only deployed to SIPRNet, this requirement is not applicable.

If the application is not intended to be available to Federal government partners this requirement is not applicable.

This requirement applies to DoD service providers who are relying parties of external (Federal Government) identity providers.

Ask the application administrator to demonstrate how the application conforms to FICAM issued profiles such as SAML or OPENID.

If the application is designed to be a service provider utilizing an external identify provider and doesn't conform to FICAM-issued profiles, this is a finding.

Check Content Reference

M

Target Key

4093

Comments