STIGQter STIGQter: STIG Summary: CA API Gateway ALG Security Technical Implementation Guide Version: 1 Release: 2 Benchmark Date: 28 Apr 2017:

The CA API Gateway providing user access control intermediary services must provide a logoff capability for user-initiated communications sessions.

DISA Rule

SV-86107r1_rule

Vulnerability Number

V-71483

Group Title

SRG-NET-000518-ALG-000007

Rule Version

CAGW-GW-000960

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Open the CA API Gateway - Policy Manager and register the Logoff APIs as Registered Services.

Assign the proper policy to the Registered Service in accordance with organizational requirements for securing/protecting Registered Services/APIs.

For more details, refer to the "Layer 7 Policy Authoring User Manual".

Additionally, update all applications developed within the organization to call the newly added Registered Service in accordance with organizational requirements.

Check Contents

Open the CA API Gateway - Policy Manager.

Verify that all services/applications requiring user-initiated logoff are registered on the Gateway and that the Logoff API is included and exposed to the users requiring user-initiated logoff capability.

If not, this is a finding.

Vulnerability Number

V-71483

Documentable

False

Rule Version

CAGW-GW-000960

Severity Override Guidance

Open the CA API Gateway - Policy Manager.

Verify that all services/applications requiring user-initiated logoff are registered on the Gateway and that the Logoff API is included and exposed to the users requiring user-initiated logoff capability.

If not, this is a finding.

Check Content Reference

M

Target Key

3049

Comments