UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Web server session IDs must be sent to the client using SSL/TLS.


Overview

Finding ID Version Rule ID IA Controls Severity
V-56003 SRG-APP-000439-WSR-000152 SV-70257r1_rule Medium
Description
The HTTP protocol is a stateless protocol. To maintain a session, a session identifier is used. The session identifier is a piece of data that is used to identify a session and a user. If the session identifier is compromised by an attacker, the session can be hijacked. By encrypting the session identifier, the identifier becomes more difficult for an attacker to hijack, decrypt, and use before the session has expired.
STIG Date
Web Server Security Requirements Guide 2014-11-17

Details

Check Text ( C-56573r2_chk )
Review the web server documentation and deployed configuration to determine whether the session identifier is being sent to the client encrypted.

If the web server does not encrypt the session identifier, this is a finding.
Fix Text (F-60881r1_fix)
Configure the web server to encrypt the session identifier for transmission to the client.