UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The firewall implementation must provide mechanisms to protect the authenticity of communications sessions.


Overview

Finding ID Version Rule ID IA Controls Severity
V-37305 SRG-NET-000230-FW-000135 SV-49066r1_rule Low
Description
This requirement addresses communications protection at the session, versus the packet level. Maintaining the authenticity of the communications session and confidence in the mutual ongoing identity of both communicating entities, the information being transmitted may be malicious or invalid. Authenticity protection includes protecting against man-in-the-middle attacks (i.e., session hijacking) and guarding against the insertion of false information into sessions.
STIG Date
Firewall Security Requirements Guide 2013-04-24

Details

Check Text ( C-45553r1_chk )
Verify the application uses session authentication mechanisms (e.g., error checking, source and destination verification, and session identification).

If mechanisms are not provided to protect the authenticity of communications sessions between the firewall and other network elements, this is a finding.
Fix Text (F-42230r1_fix)
Configure the firewall implementation to require session authentication mechanisms (e.g., error checking, source and destination verification, and session identification) when communicating.