Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-59975 | SP13-00-000110 | SV-74405r2_rule | High |
Description |
---|
This control focuses on communications protection at the session, versus packet level. At the application layer, session IDs are tokens generated by web applications to uniquely identify an application user's session. Web applications utilize session tokens or session IDs in order to establish application user identity. Proper use of session IDs addresses man-in-the-middle attacks, including session hijacking or insertion of false information into a session. This control is only implemented where deemed necessary by the organization (e.g., sessions in service-oriented architectures providing web-based services). |
STIG | Date |
---|---|
MS SharePoint 2013 Security Technical Implementation Guide | 2018-06-27 |
Check Text ( C-60665r3_chk ) |
---|
Review the SharePoint server configuration to ensure SSL Mutual authentication of both client and server during the entire session. Navigate to Central Administration. Under “System Settings”, click “Configure Alternate Access mappings”. Review the “Public URL for zone” column values. If any URL does not begin with “https”, this is a finding. |
Fix Text (F-65385r4_fix) |
---|
Configure the SharePoint server to ensure SSL Mutual authentication of both client and server during the entire session. Open IIS Manager. In the Connections pane, expand "Sites". Click the "Web Application" site. In the Actions pane, click "Bindings". In the Site Bindings window, click "Add". In the Add Site Binding window, change "Type" to "https", and select the site's SSL certificate. Click "OK". Remove all bindings that do not use https. Click "Close". |