STIGQter STIGQter: STIG Summary: Application Security and Development Security Technical Implementation Guide Version: 5 Release: 1 Benchmark Date: 23 Oct 2020:

Validity periods must be verified on all application messages using WS-Security or SAML assertions.

DISA Rule

SV-222400r508029_rule

Vulnerability Number

V-222400

Group Title

SRG-APP-000014

Rule Version

APSC-DV-000200

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

Design and configure the application to use validity periods, ensure validity periods are verified on all WS-Security token profiles and SAML Assertions.

Check Contents

Ask the application representative for the design document.

Review the design document for web services.

If the application does not utilize WSS or SAML assertions, this requirement is not applicable.

Review the design document and verify validity periods are checked on all messages using WS-Security or SAML assertions.

If the design document does not exist, or does not indicate validity periods are checked on messages using WS-Security or SAML assertions, this is a finding.

Vulnerability Number

V-222400

Documentable

False

Rule Version

APSC-DV-000200

Severity Override Guidance

Ask the application representative for the design document.

Review the design document for web services.

If the application does not utilize WSS or SAML assertions, this requirement is not applicable.

Review the design document and verify validity periods are checked on all messages using WS-Security or SAML assertions.

If the design document does not exist, or does not indicate validity periods are checked on messages using WS-Security or SAML assertions, this is a finding.

Check Content Reference

M

Target Key

4093

Comments