800-53|SC-23(3)

Title

UNIQUE SESSION IDENTIFIERS WITH RANDOMIZATION

Description

The information system generates a unique session identifier for each session with [Assignment: organization-defined randomness requirements] and recognizes only session identifiers that are system-generated.

Supplemental

This control enhancement curtails the ability of adversaries from reusing previously valid session IDs. Employing the concept of randomness in the generation of unique session identifiers helps to protect against brute-force attacks to determine future session identifiers.

Reference Item Details

Related: SC-13

Category: SYSTEM AND COMMUNICATIONS PROTECTION

Parent Title: SESSION AUTHENTICITY

Family: SYSTEM AND COMMUNICATIONS PROTECTION

Audit Items

View all Reference Audit Items

NamePluginAudit Name
39 - Increase the entropy in session identifiersUnixTNS Best Practice Jetty 9 Linux
AS24-U1-000030 - The Apache web server must use cryptography to protect the integrity of remote sessions - ssl_moduleUnixDISA STIG Apache Server 2.4 Unix Server v2r5 Middleware
AS24-U1-000030 - The Apache web server must use cryptography to protect the integrity of remote sessions - ssl_moduleUnixDISA STIG Apache Server 2.4 Unix Server v2r5
AS24-U1-000030 - The Apache web server must use cryptography to protect the integrity of remote sessions - SSLProtocolUnixDISA STIG Apache Server 2.4 Unix Server v2r5
AS24-U1-000030 - The Apache web server must use cryptography to protect the integrity of remote sessions - SSLProtocolUnixDISA STIG Apache Server 2.4 Unix Server v2r5 Middleware
AS24-U1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - httpdUnixDISA STIG Apache Server 2.4 Unix Server v2r5
AS24-U1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - httpdUnixDISA STIG Apache Server 2.4 Unix Server v2r5 Middleware
AS24-U1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - SessionCookieName DomainUnixDISA STIG Apache Server 2.4 Unix Server v2r5 Middleware
AS24-U1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - SessionCookieName DomainUnixDISA STIG Apache Server 2.4 Unix Server v2r5
AS24-U1-000510 - The Apache web server must generate a session ID long enough that it cannot be guessed through brute force - session_cryptoUnixDISA STIG Apache Server 2.4 Unix Server v2r5
AS24-U1-000510 - The Apache web server must generate a session ID long enough that it cannot be guessed through brute force - session_cryptoUnixDISA STIG Apache Server 2.4 Unix Server v2r5 Middleware
AS24-U1-000510 - The Apache web server must generate a session ID long enough that it cannot be guessed through brute force - SessionCryptoCipherUnixDISA STIG Apache Server 2.4 Unix Server v2r5 Middleware
AS24-U1-000510 - The Apache web server must generate a session ID long enough that it cannot be guessed through brute force - SessionCryptoCipherUnixDISA STIG Apache Server 2.4 Unix Server v2r5
AS24-U1-000520 - The Apache web server must generate a session ID using as much of the character set as possible to reduce the risk of brute force.UnixDISA STIG Apache Server 2.4 Unix Server v2r5
AS24-U1-000520 - The Apache web server must generate a session ID using as much of the character set as possible to reduce the risk of brute force.UnixDISA STIG Apache Server 2.4 Unix Server v2r5 Middleware
AS24-U2-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - Header HttpOnly SecureUnixDISA STIG Apache Server 2.4 Unix Site v2r2 Middleware
AS24-U2-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - Header HttpOnly SecureUnixDISA STIG Apache Server 2.4 Unix Site v2r2
AS24-U2-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - Javascript setCookieUnixDISA STIG Apache Server 2.4 Unix Site v2r2
AS24-U2-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - Javascript setCookieUnixDISA STIG Apache Server 2.4 Unix Site v2r2 Middleware
AS24-W1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - Header HttpOnly secureWindowsDISA STIG Apache Server 2.4 Windows Server v2r2
AS24-W1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - Javascript setCookieWindowsDISA STIG Apache Server 2.4 Windows Server v2r2
AS24-W1-000480 - The Apache web server must accept only system-generated session identifiers.WindowsDISA STIG Apache Server 2.4 Windows Server v2r2
AS24-W1-000500 - The Apache web server must generate unique session identifiers that cannot be reliably reproduced.WindowsDISA STIG Apache Server 2.4 Windows Server v2r2
AS24-W1-000530 - The Apache web server must generate unique session identifiers with definable entropy - ssl_moduleWindowsDISA STIG Apache Server 2.4 Windows Server v2r2
AS24-W1-000530 - The Apache web server must generate unique session identifiers with definable entropy - SSLRandomSeed connectWindowsDISA STIG Apache Server 2.4 Windows Server v2r2
AS24-W1-000530 - The Apache web server must generate unique session identifiers with definable entropy - SSLRandomSeed startupWindowsDISA STIG Apache Server 2.4 Windows Server v2r2
AS24-W2-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - Header HttpOnly SecureWindowsDISA STIG Apache Server 2.4 Windows Site v2r1
AS24-W2-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - Javascript setCookieWindowsDISA STIG Apache Server 2.4 Windows Site v2r1
AS24-W2-000480 - The Apache web server must accept only system-generated session identifiers.WindowsDISA STIG Apache Server 2.4 Windows Site v2r1
AS24-W2-000500 - The Apache web server must generate unique session identifiers that cannot be reliably reproduced.WindowsDISA STIG Apache Server 2.4 Windows Site v2r1
AS24-W2-000520 - The Apache web server must generate a session ID using as much of the character set as possible to reduce the risk of brute force.WindowsDISA STIG Apache Server 2.4 Windows Site v2r1
CASA-VN-000610 - The Cisco ASA remote access VPN server must be configured to generate unique session identifiers using a FIPS-validated Random Number Generator (RNG) based on the Deterministic Random Bit Generators (DRBG) algorithm.CiscoDISA STIG Cisco ASA VPN v1r1
DB2X-00-005100 - DB2 must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values - SSLUnixDISA STIG IBM DB2 v10.5 LUW v1r4 OS Linux
DB2X-00-005100 - DB2 must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values - SSLWindowsDISA STIG IBM DB2 v10.5 LUW v1r4 OS Windows
DB2X-00-005100 - DB2 must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values - SSL_SVCENAMEUnixDISA STIG IBM DB2 v10.5 LUW v1r4 OS Linux
DB2X-00-005100 - DB2 must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values - SSL_SVCENAMEWindowsDISA STIG IBM DB2 v10.5 LUW v1r4 OS Windows
DB2X-00-005100 - DB2 must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values - SVCENAMEUnixDISA STIG IBM DB2 v10.5 LUW v1r4 OS Linux
DB2X-00-005100 - DB2 must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values - SVCENAMEWindowsDISA STIG IBM DB2 v10.5 LUW v1r4 OS Windows
DKER-EE-001070 - FIPS mode must be enabled on all Docker Engine - Enterprise nodes - docker info .SecurityOptionsUnixDISA STIG Docker Enterprise 2.x Linux/Unix v2r1
FGFW-ND-000280 - The FortiGate device must generate unique session identifiers using a FIPS 140-2-approved random number generator.FortiGateDISA Fortigate Firewall NDM STIG v1r1
IIST-SI-000220 - A private IIS 10.0 website authentication mechanism must use client certificates to transmit session identifier to assure integrity.WindowsDISA IIS 10.0 Site v2r5
IIST-SI-000223 - The IIS 10.0 website must generate unique session identifiers that cannot be reliably reproduced.WindowsDISA IIS 10.0 Site v2r5
IIST-SV-000134 - The IIS 10.0 web server must use cookies to track session state.WindowsDISA IIS 10.0 Server v2r5
IIST-SV-000135 - The IIS 10.0 web server must accept only system-generated session identifiers - sessionStateWindowsDISA IIS 10.0 Server v2r5
IIST-SV-000135 - The IIS 10.0 web server must accept only system-generated session identifiers - timeoutWindowsDISA IIS 10.0 Server v2r5
IISW-SI-000220 - A private websites authentication mechanism must use client certificates to transmit session identifier to assure integrity.WindowsDISA IIS 8.5 Site v2r5
IISW-SI-000223 - The IIS 8.5 website must generate unique session identifiers that cannot be reliably reproduced.WindowsDISA IIS 8.5 Site v2r5
IISW-SV-000134 - The IIS 8.5 web server must use cookies to track session state.WindowsDISA IIS 8.5 Server v2r3
IISW-SV-000135 - The IIS 8.5 web server must limit the amount of time a cookie persists - sessionStateWindowsDISA IIS 8.5 Server v2r3
IISW-SV-000135 - The IIS 8.5 web server must limit the amount of time a cookie persists - timeoutWindowsDISA IIS 8.5 Server v2r3