UCF STIG Viewer Logo

The IDPS must provide mechanisms to protect the authenticity of communications sessions.


Overview

Finding ID Version Rule ID IA Controls Severity
V-34744 SRG-NET-000230-IDPS-00164 SV-45653r1_rule Low
Description
This requirement addresses communications protection at the session, versus packet level (e.g., sessions in service-oriented architectures providing web-based services). Maintaining the authenticity of the communications session and confidence in the mutual ongoing identity of both communicating entities, the information being transmitted may be malicious or invalid. Authenticity protection includes protecting against man-in-the-middle attacks (i.e., session hijacking) and guarding against the insertion of false information into sessions.
STIG Date
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide 2012-11-19

Details

Check Text ( C-43019r1_chk )
Verify the application uses session authentication mechanisms (e.g., error checking, source and destination verification, and session identification).

If mechanisms are not provided to protect the authenticity of communications session between the IDPS components and other network elements, this is a finding.
Fix Text (F-39051r1_fix)
Configure the IDPS to require session authentication mechanisms (e.g., error checking, source and destination verification, and session identification) when communicating.