IIST-SV-000135 - The IIS 10.0 web server must accept only system-generated session identifiers.

Information

ASP.NET provides a session state, which is available as the HttpSessionState class, as a method of storing session-specific information that is visible only within the session. ASP.NET session state identifies requests from the same browser during a limited time window as a session and provides the ability to persist variable values for the duration of that session.

When using the URI mode for cookie settings under session state, IIS will reject and reissue session IDs that do not have active sessions. Configuring IIS to expire session IDs and regenerate tokens gives a potential attacker less time to capture a cookie and gain access to server content.

Solution

Open the IIS 10.0 Manager.

Click the IIS 10.0 web server name.

Under the 'ASP.NET' section, select 'Session State'.

Under 'Cookie Settings', select the 'Use Cookies' mode from the 'Mode:' drop-down list.

Under 'Time-out (in minutes)', enter a value of '20 or less'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_IIS_10-0_Y23M10_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-23(3), CAT|II, CCI|CCI-001664, Rule-ID|SV-218805r928917_rule, STIG-ID|IIST-SV-000135, STIG-Legacy|SV-109249, STIG-Legacy|V-100145, Vuln-ID|V-218805

Plugin: Windows

Control ID: b25b9ce54d9a7296f6b32fc25bfb99258c4bd66c47a57d4738618c0bc18f7553