Item Search

NameAudit NamePluginCategory
AS24-U1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - httpdDISA STIG Apache Server 2.4 Unix Server v2r3 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-U1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - httpdDISA STIG Apache Server 2.4 Unix Server v2r5 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-U1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - httpdDISA STIG Apache Server 2.4 Unix Server v3r1 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-U1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - SessionCookieName DomainDISA STIG Apache Server 2.4 Unix Server v2r5 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-U1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - SessionCookieName DomainDISA STIG Apache Server 2.4 Unix Server v3r1 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-U1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - SessionCookieName HttpOnly SecureDISA STIG Apache Server 2.4 Unix Server v3r1 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-U1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application.DISA STIG Apache Server 2.4 Unix Server v3r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-U1-000510 - The Apache web server must generate a session ID long enough that it cannot be guessed through brute force - session_cryptoDISA STIG Apache Server 2.4 Unix Server v3r1 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-U1-000510 - The Apache web server must generate a session ID long enough that it cannot be guessed through brute force - session_cryptoDISA STIG Apache Server 2.4 Unix Server v2r5 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-U1-000510 - The Apache web server must generate a session ID long enough that it cannot be guessed through brute force - session_cryptoDISA STIG Apache Server 2.4 Unix Server v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-U1-000510 - The Apache web server must generate a session ID long enough that it cannot be guessed through brute force - session_cryptoDISA STIG Apache Server 2.4 Unix Server v2r3 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-U1-000510 - The Apache web server must generate a session ID long enough that it cannot be guessed through brute force - SessionCryptoCipherDISA STIG Apache Server 2.4 Unix Server v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-U1-000510 - The Apache web server must generate a session ID long enough that it cannot be guessed through brute force - SessionCryptoCipherDISA STIG Apache Server 2.4 Unix Server v3r1 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-U1-000510 - The Apache web server must generate a session ID long enough that it cannot be guessed through brute force.DISA STIG Apache Server 2.4 Unix Server v3r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-U1-000520 - The Apache web server must generate a session ID using as much of the character set as possible to reduce the risk of brute force.DISA STIG Apache Server 2.4 Unix Server v2r3 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-U1-000520 - The Apache web server must generate a session ID using as much of the character set as possible to reduce the risk of brute force.DISA STIG Apache Server 2.4 Unix Server v2r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-U1-000520 - The Apache web server must generate a session ID using as much of the character set as possible to reduce the risk of brute force.DISA STIG Apache Server 2.4 Unix Server v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-U1-000520 - The Apache web server must generate a session ID using as much of the character set as possible to reduce the risk of brute force.DISA STIG Apache Server 2.4 Unix Server v2r5 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-U2-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - Header HttpOnly SecureDISA STIG Apache Server 2.4 Unix Site v2r1 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-U2-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - Header HttpOnly SecureDISA STIG Apache Server 2.4 Unix Site v2r2 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-U2-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application.DISA STIG Apache Server 2.4 Unix Site v2r4 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-U2-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application.DISA STIG Apache Server 2.4 Unix Site v2r4Unix

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-W1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - Header HttpOnly secureDISA STIG Apache Server 2.4 Windows Server v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-W1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - Header HttpOnly secureDISA STIG Apache Server 2.4 Windows Server v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-W1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - Header HttpOnly secureDISA STIG Apache Server 2.4 Windows Server v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-W1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - Javascript setCookieDISA STIG Apache Server 2.4 Windows Server v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-W1-000480 - The Apache web server must accept only system-generated session identifiers.DISA STIG Apache Server 2.4 Windows Server v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-W1-000500 - The Apache web server must generate unique session identifiers that cannot be reliably reproduced.DISA STIG Apache Server 2.4 Windows Server v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-W1-000500 - The Apache web server must generate unique session identifiers that cannot be reliably reproduced.DISA STIG Apache Server 2.4 Windows Server v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-W1-000500 - The Apache web server must generate unique session identifiers that cannot be reliably reproduced.DISA STIG Apache Server 2.4 Windows Server v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-W1-000530 - The Apache web server must generate unique session identifiers with definable entropy - ssl_moduleDISA STIG Apache Server 2.4 Windows Server v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-W1-000530 - The Apache web server must generate unique session identifiers with definable entropy - ssl_moduleDISA STIG Apache Server 2.4 Windows Server v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-W1-000530 - The Apache web server must generate unique session identifiers with definable entropy - SSLRandomSeed connectDISA STIG Apache Server 2.4 Windows Server v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-W1-000530 - The Apache web server must generate unique session identifiers with definable entropy - SSLRandomSeed startupDISA STIG Apache Server 2.4 Windows Server v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-W1-000530 - The Apache web server must generate unique session identifiers with definable entropy - SSLRandomSeed startupDISA STIG Apache Server 2.4 Windows Server v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-W1-000530 - The Apache web server must generate unique session identifiers with definable entropy - SSLRandomSeed startupDISA STIG Apache Server 2.4 Windows Server v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-W1-000530 - The Apache web server must generate unique session identifiers with definable entropy - SSLRandomSeed startupDISA STIG Apache Server 2.4 Windows Server v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-W2-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - Header HttpOnly SecureDISA STIG Apache Server 2.4 Windows Site v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-W2-000480 - The Apache web server must accept only system-generated session identifiers.DISA STIG Apache Server 2.4 Windows Site v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-W2-000500 - The Apache web server must generate unique session identifiers that cannot be reliably reproduced.DISA STIG Apache Server 2.4 Windows Site v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-W2-000520 - The Apache web server must generate a session ID using as much of the character set as possible to reduce the risk of brute force.DISA STIG Apache Server 2.4 Windows Site v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

IIST-SI-000244 - IIS 10.0 website session IDs must be sent to the client using TLS.DISA IIS 10.0 Site v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

IIST-SV-000134 - The IIS 10.0 web server must use cookies to track session state.DISA IIS 10.0 Server v2r10Windows

SYSTEM AND COMMUNICATIONS PROTECTION

IIST-SV-000135 - The IIS 10.0 web server must accept only system-generated session identifiers - timeoutDISA IIS 10.0 Server v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

IISW-SI-000223 - The IIS 8.5 website must generate unique session identifiers that cannot be reliably reproduced.DISA IIS 8.5 Site v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

IISW-SI-000223 - The IIS 8.5 website must generate unique session identifiers that cannot be reliably reproduced.DISA IIS 8.5 Site v2r9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

IISW-SI-000244 - IIS 8.5 website session IDs must be sent to the client using TLS.DISA IIS 8.5 Site v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

IISW-SV-000135 - The IIS 8.5 web server must limit the amount of time a cookie persists - timeoutDISA IIS 8.5 Server v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

IISW-SV-000135 - The IIS 8.5 web server must limit the amount of time a cookie persists.DISA IIS 8.5 Server v2r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

PGS9-00-011400 - PostgreSQL must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values.DISA STIG PostgreSQL 9.x on RHEL DB v2r5PostgreSQLDB

SYSTEM AND COMMUNICATIONS PROTECTION