UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Cookies exchanged between the Apache web server and the client, such as session cookies, must have cookie properties set to force the encryption of cookies.


Overview

Finding ID Version Rule ID IA Controls Severity
V-92587 AS24-W2-000880 SV-102675r1_rule Medium
Description
Cookies can be sent to a client using TLS/SSL to encrypt the cookies, but TLS/SSL is not used by every hosted application since the data being displayed does not require the encryption of the transmission. To safeguard against cookies, especially session cookies, being sent in plaintext, a cookie can be encrypted before transmission. To force a cookie to be encrypted before transmission, the cookie "Secure" property can be set.
STIG Date
Apache Server 2.4 Windows Site Security Technical Implementation Guide 2019-12-19

Details

Check Text ( C-91891r1_chk )
Verify the "mod_session_crypto" module is installed.

If the mod_session_crypto module is not being used, this is a finding.
Fix Text (F-98829r1_fix)
Ensure the "mod_session_crypto" module is installed.

Enable encrypted session cookies.

Example:

Session On
SessionCookieName session path=/
SessionCryptoPassphrase secret