STIGQter STIGQter: STIG Summary: Application Security and Development Security Technical Implementation Guide Version: 5 Release: 1 Benchmark Date: 23 Oct 2020:

The application performing organization-defined security functions must verify correct operation of security functions.

DISA Rule

SV-222615r508029_rule

Vulnerability Number

V-222615

Group Title

SRG-APP-000472

Rule Version

APSC-DV-002760

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Design the application to verify the correct operation of security functions.

Check Contents

Review the application documentation and interview the system administrator to determine if the application performs security function testing.

If the application is not designed or intended to perform security function testing, the requirement is not applicable.

Access the application design documents and determine if the application is designed to verify the correct operation of security functions.

Review application logs and take note of log entries that indicate security function testing is being performed and verified.

If the application is designed to perform security function testing and does not verify the correct operation of security functions, this is a finding.

Vulnerability Number

V-222615

Documentable

False

Rule Version

APSC-DV-002760

Severity Override Guidance

Review the application documentation and interview the system administrator to determine if the application performs security function testing.

If the application is not designed or intended to perform security function testing, the requirement is not applicable.

Access the application design documents and determine if the application is designed to verify the correct operation of security functions.

Review application logs and take note of log entries that indicate security function testing is being performed and verified.

If the application is designed to perform security function testing and does not verify the correct operation of security functions, this is a finding.

Check Content Reference

M

Target Key

4093

Comments