SV-222597r561260_rule
V-222597
SRG-APP-000440
APSC-DV-002450
CAT II
10
Configure the application to use cryptographic protections to prevent unauthorized disclosure of application data based upon the application architecture.
Review the application documentation, the application architecture designs and interview the application administrator.
Ask the application admin to identify the network path taken by the application data and demonstrate the application support integrity mechanisms for transmission of both incoming and outgoing files and any transmitted data.
For example, hashing/digital signature and cyclic redundancy checks (CRCs) can be used to confirm integrity on data streams and transmitted files.
Use of TLS can be used to assure integrity in point-to-point communication sessions.
When the application uses messaging or web services or other technologies where the data can traverse multiple hops, the individual message or packet must be encrypted to protect the integrity of the message.
If the application is not configured to provide cryptographic protections to application data while it is transmitted unless protected by alternative safety measures like a PDS, this is a finding.
V-222597
False
APSC-DV-002450
Review the application documentation, the application architecture designs and interview the application administrator.
Ask the application admin to identify the network path taken by the application data and demonstrate the application support integrity mechanisms for transmission of both incoming and outgoing files and any transmitted data.
For example, hashing/digital signature and cyclic redundancy checks (CRCs) can be used to confirm integrity on data streams and transmitted files.
Use of TLS can be used to assure integrity in point-to-point communication sessions.
When the application uses messaging or web services or other technologies where the data can traverse multiple hops, the individual message or packet must be encrypted to protect the integrity of the message.
If the application is not configured to provide cryptographic protections to application data while it is transmitted unless protected by alternative safety measures like a PDS, this is a finding.
M
4093