UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

SharePoint must ensure authentication of both client and server during the entire session. An example of this is SSL Mutual Authentication.


Overview

Finding ID Version Rule ID IA Controls Severity
V-59975 SP13-00-000110 SV-74405r2_rule High
Description
This control focuses on communications protection at the session, versus packet level. At the application layer, session IDs are tokens generated by web applications to uniquely identify an application user's session. Web applications utilize session tokens or session IDs in order to establish application user identity. Proper use of session IDs addresses man-in-the-middle attacks, including session hijacking or insertion of false information into a session. This control is only implemented where deemed necessary by the organization (e.g., sessions in service-oriented architectures providing web-based services).
STIG Date
MS SharePoint 2013 Security Technical Implementation Guide 2019-01-08

Details

Check Text ( C-60665r3_chk )
Review the SharePoint server configuration to ensure SSL Mutual authentication of both client and server during the entire session.

Navigate to Central Administration.

Under “System Settings”, click “Configure Alternate Access mappings”.

Review the “Public URL for zone” column values. If any URL does not begin with “https”, this is a finding.
Fix Text (F-65385r4_fix)
Configure the SharePoint server to ensure SSL Mutual authentication of both client and server during the entire session.

Open IIS Manager.

In the Connections pane, expand "Sites".

Click the "Web Application" site.

In the Actions pane, click "Bindings".

In the Site Bindings window, click "Add".

In the Add Site Binding window, change "Type" to "https", and select the site's SSL certificate. Click "OK".

Remove all bindings that do not use https.

Click "Close".