4.1.2.1 Ensure 'sameSiteCookie' attribute is set to 'Strict'

Information

The SameSite attribute is used by web browsers to determine if a particular cookie should be sent with a request. Setting this attribute can help protect against Cross Site Request Forgery (CSRF) attacks. It is recommended to set the SameSite attribute to Strict A Strict value for the SameSite attribute ensures the cookie is only sent by the web browser if the site for the cookie matches the site in the address bar, for example.

Cookies without a SameSite attribute are treated as if they have the SameSite attribute value of Lax for some browsers.

Solution

Add the sameSiteCookie attribute to the webAppSecurity element in ${server.config.dir}/configDropins/overrides/<any file name>.xml Set the sameSiteCookie value to Strict

<webAppSecurity sameSiteCookie="Strict"/>

See Also

https://workbench.cisecurity.org/benchmarks/7724

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-23

Plugin: Unix

Control ID: e821a2cb67cae727adcce5f19e7e8ff02b52397f163aa4c36937d2f16608b316