STIGQter STIGQter: STIG Summary: Application Security and Development Security Technical Implementation Guide Version: 4 Release: 9 Benchmark Date: 25 Jan 2019: The application must electronically verify Personal Identity Verification (PIV) credentials from other federal agencies.

DISA Rule

SV-84787r1_rule

Vulnerability Number

V-70165

Group Title

SRG-APP-000403

Rule Version

APSC-DV-001890

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the application to verify the PIV credentials presented when utilizing authentication provided by Federal (Non-DoD) agencies.

Check Contents

Review the application documentation and interview the application administrator to identify application access methods.

If the application is not PK-enabled due to the hosted data being publicly releasable, this check is not applicable.

If the application is only deployed to SIPRNet, this requirement is not applicable.

If the application is not intended to be available to Federal government (non-DoD) partners this requirement is not applicable.

Ask the application administrator to demonstrate how the application is configured to verify the PIV credentials from other agencies when they are presented as an authentication token.

If the application is required to provide authenticated access to Federal agencies and it does verify the PIV, this is a finding.

Vulnerability Number

V-70165

Documentable

False

Rule Version

APSC-DV-001890

Severity Override Guidance

Review the application documentation and interview the application administrator to identify application access methods.

If the application is not PK-enabled due to the hosted data being publicly releasable, this check is not applicable.

If the application is only deployed to SIPRNet, this requirement is not applicable.

If the application is not intended to be available to Federal government (non-DoD) partners this requirement is not applicable.

Ask the application administrator to demonstrate how the application is configured to verify the PIV credentials from other agencies when they are presented as an authentication token.

If the application is required to provide authenticated access to Federal agencies and it does verify the PIV, this is a finding.

Check Content Reference

M

Target Key

3009

Comments