SV-222425r508029_rule
V-222425
SRG-APP-000033
APSC-DV-000460
CAT I
10
Design or configure the application to enforce access to application resources.
Review the application documentation and interview the application administrator.
Review application data protection requirements.
Identify application resources that require protection and authentication over and above the authentication required to access the application itself.
This can be access to a URL, a folder, a file, a process or a database record that should only be available to certain individuals.
Identify the access control methods utilized by the application in order to control access to the resource.
Examples include Role-Based Access Control policies (RBAC).
Using RBAC as an example, utilize a test account placed into a test role.
Set a protection control on a resource and explicitly deny access to the role assigned to the test user account.
Try to access an application resource that is not configured to allow access. Access should be denied.
If the enforcement of configured access restrictions is not performed, this is a finding.
V-222425
False
APSC-DV-000460
Review the application documentation and interview the application administrator.
Review application data protection requirements.
Identify application resources that require protection and authentication over and above the authentication required to access the application itself.
This can be access to a URL, a folder, a file, a process or a database record that should only be available to certain individuals.
Identify the access control methods utilized by the application in order to control access to the resource.
Examples include Role-Based Access Control policies (RBAC).
Using RBAC as an example, utilize a test account placed into a test role.
Set a protection control on a resource and explicitly deny access to the role assigned to the test user account.
Try to access an application resource that is not configured to allow access. Access should be denied.
If the enforcement of configured access restrictions is not performed, this is a finding.
M
4093