IIST-SV-000152 - IIS 10.0 web server session IDs must be sent to the client using TLS.

Information

The HTTP protocol is a stateless protocol. To maintain a session, a session identifier is used. The session identifier is a piece of data used to identify a session and a user. If the session identifier is compromised by an attacker, the session can be hijacked. By encrypting the session identifier, the identifier becomes more difficult for an attacker to hijack, decrypt, and use before the session has expired.

Solution

Open the IIS 10.0 Manager.

Click the IIS 10.0 web server name.

Under 'Management' section, double-click the 'Configuration Editor' icon.

From the 'Section:' drop-down list, select 'system.webServer/asp'.

Expand the 'session' section.

Select 'True' for the 'keepSessionIdSecure' setting.

Select 'Apply' from the 'Actions' pane.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_IIS_10-0_Y24M10_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-8, CAT|II, CCI|CCI-002418, Rule-ID|SV-218820r961632_rule, STIG-ID|IIST-SV-000152, STIG-Legacy|SV-109279, STIG-Legacy|V-100175, Vuln-ID|V-218820

Plugin: Windows

Control ID: d13f7cb9ec00a8983bfe5bec5d9859e5e72f057d374b68188fa85668dcf3c62b