F5BI-AP-000243 - The F5 BIG-IP appliance must be configured to disable the 'Persistent' cookie flag.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

For BIG-IP APM deployments with connectivity resources (such as Network Access, Portal Access, etc.), BIG-IP APM cookies cannot be set as 'Persistent'. This is by design since cookies are stored locally on the client's hard disk and thus could be exposed to unauthorized external access. For some deployments of the BIG-IP APM system, cookie persistence may be required. When cookie persistence is selected, persistence is hard coded at 60 seconds.

Solution

Note: Testing must be performed prior to implementation to prevent operational impact. This setting may break access to certain applications that require cookie persistence.

From the BIG-IP GUI:
1. Access.
2. Profiles/Policies.
3. Access Profiles.
4. Click the Access profile name.
5. 'SSO/Auth Domains' tab.
6. Under 'Cookie Options', uncheck 'Persistent'.
7. Click 'Update.'
8. Click 'Apply Access Policy'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_F5_BIG-IP_Y24M01_STIG.zip

Item Details

References: CAT|III, CCI|CCI-001664, Rule-ID|SV-260060r947405_rule, STIG-ID|F5BI-AP-000243, Vuln-ID|V-260060

Plugin: F5

Control ID: a86561ceca7b428083031596aaf8a493367d0c649a758053a2c5f30556e494dc