UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The ALG must prohibit the use of cached authenticators after an organization-defined time period.


Overview

Finding ID Version Rule ID IA Controls Severity
V-54527 SRG-NET-000344-ALG-000098 SV-68773r1_rule Medium
Description
If the cached authenticator information is out of date, the validity of the authentication information may be questionable. This requirement applies to all ALGs which may cache user authenticators for use throughout a session. This requirement also applies to ALGs that provide user authentication intermediary services (e.g., authentication gateway or TLS gateway). This does not apply to authentication for the purpose of configuring the device itself (device management).
STIG Date
Application Layer Gateway Security Requirements Guide 2014-11-03

Details

Check Text ( C-55143r1_chk )
Verify the ALG prohibits the use of cached authenticators after an organization-defined time period.

If the ALG does not prohibit the use of cached authenticators after an organization-defined time period, this is a finding.
Fix Text (F-59381r1_fix)
Configure the ALG to prohibit the use of cached authenticators after an organization-defined time period.