UCF STIG Viewer Logo

The designer will ensure the application uses mechanisms assuring the integrity of all transmitted information (including labels and security parameters).


Overview

Finding ID Version Rule ID IA Controls Severity
V-16794 APP3260 SV-17794r2_rule ECTM-1 ECTM-2 Medium
Description
Data is subject to manipulation and other integrity related attacks whenever that data is transferred across a network. To protect data integrity during transmission, the application must implement mechanisms to ensure the integrity of all transmitted information. All transmitted information means that the protections are not restricted to just the data itself. Protection mechanisms must be extended to include data labels, security parameters or metadata if data protection requirements specify. Modern web application data transfer methods can be complex and are not necessarily just point to point in nature. Service Oriented Architecture (SOA) and RESTFUL web services allow for XML based application data to be transmitted in a manner similar to network traffic wherein the application data is transmitted along multiple servers hops. In such cases, point to point protection methods like TLS or SSL may not be the best choice for ensuring data integrity and alternative data integrity protection methods like XML Integrity Signature protections where the XML payload itself is signed may be required as part of the application design. Overall application design and architecture must always be taken into account when establishing data integrity protection mechanisms. Custom-developed solutions that provide a file transfer capability should implement data integrity checks for incoming and outgoing files. Transmitted information requires mechanisms to ensure the data integrity (e.g. digital signatures, SSL, TLS or cryptographic hashing).
STIG Date
Application Security and Development Checklist 2014-12-22

Details

Check Text ( C-17782r2_chk )
Ask the application representative to demonstrate the application support mechanisms assuring the integrity of all transmitted information to include labels and security parameters. Ask the application representative to login and demonstrate the application support integrity mechanisms for transmission of both incoming and outgoing files and any transmitted data. For example, hashing/digital signature and cyclic redundancy checks (CRCs) can be used to confirm integrity on data streams and transmitted files.

1) If the application does not support integrity mechanisms for any transmitted data, this is a finding.

2) If the application does not support integrity mechanisms for file transmission, this is a finding.

*Note: These checks apply to all data transmitted by REST-styled or SOAP-based Web Services.
Fix Text (F-17015r1_fix)
Implement integrity mechanisms for transmission of both incoming and outgoing data.