800-53|SC-23(3)

Title

UNIQUE SESSION IDENTIFIERS WITH RANDOMIZATION

Description

The information system generates a unique session identifier for each session with [Assignment: organization-defined randomness requirements] and recognizes only session identifiers that are system-generated.

Supplemental

This control enhancement curtails the ability of adversaries from reusing previously valid session IDs. Employing the concept of randomness in the generation of unique session identifiers helps to protect against brute-force attacks to determine future session identifiers.

Reference Item Details

Related: SC-13

Category: SYSTEM AND COMMUNICATIONS PROTECTION

Parent Title: SESSION AUTHENTICITY

Family: SYSTEM AND COMMUNICATIONS PROTECTION

Audit Items

View all Reference Audit Items

NamePluginAudit Name
1.12.13 Increase the entropy in session identifiersUnixCIS Apache Tomcat5.5/6.0 L2 v1.0
39 - Increase the entropy in session identifiersUnixTNS Best Practice Jetty 9 Linux
AS24-U1-000030 - The Apache web server must use cryptography to protect the integrity of remote sessions - ssl_moduleUnixDISA STIG Apache Server 2.4 Unix Server v2r7 Middleware
AS24-U1-000030 - The Apache web server must use cryptography to protect the integrity of remote sessions - SSLProtocolUnixDISA STIG Apache Server 2.4 Unix Server v2r7 Middleware
AS24-U1-000030 - The Apache web server must use cryptography to protect the integrity of remote sessions.UnixDISA STIG Apache Server 2.4 Unix Server v2r7
AS24-U1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - httpdUnixDISA STIG Apache Server 2.4 Unix Server v2r3
AS24-U1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - httpdUnixDISA STIG Apache Server 2.4 Unix Server v2r7 Middleware
AS24-U1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - httpdUnixDISA STIG Apache Server 2.4 Unix Server v2r3 Middleware
AS24-U1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - httpdUnixDISA STIG Apache Server 2.4 Unix Server v2r5 Middleware
AS24-U1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - httpdUnixDISA STIG Apache Server 2.4 Unix Server v2r5
AS24-U1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - SessionCookieName DomainUnixDISA STIG Apache Server 2.4 Unix Server v2r3
AS24-U1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - SessionCookieName DomainUnixDISA STIG Apache Server 2.4 Unix Server v2r3 Middleware
AS24-U1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - SessionCookieName DomainUnixDISA STIG Apache Server 2.4 Unix Server v2r5
AS24-U1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - SessionCookieName DomainUnixDISA STIG Apache Server 2.4 Unix Server v2r5 Middleware
AS24-U1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - SessionCookieName DomainUnixDISA STIG Apache Server 2.4 Unix Server v2r7 Middleware
AS24-U1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application.UnixDISA STIG Apache Server 2.4 Unix Server v2r7
AS24-U1-000510 - The Apache web server must generate a session ID long enough that it cannot be guessed through brute force - session_cryptoUnixDISA STIG Apache Server 2.4 Unix Server v2r5
AS24-U1-000510 - The Apache web server must generate a session ID long enough that it cannot be guessed through brute force - session_cryptoUnixDISA STIG Apache Server 2.4 Unix Server v2r7 Middleware
AS24-U1-000510 - The Apache web server must generate a session ID long enough that it cannot be guessed through brute force - session_cryptoUnixDISA STIG Apache Server 2.4 Unix Server v2r3
AS24-U1-000510 - The Apache web server must generate a session ID long enough that it cannot be guessed through brute force - session_cryptoUnixDISA STIG Apache Server 2.4 Unix Server v2r3 Middleware
AS24-U1-000510 - The Apache web server must generate a session ID long enough that it cannot be guessed through brute force - session_cryptoUnixDISA STIG Apache Server 2.4 Unix Server v2r5 Middleware
AS24-U1-000510 - The Apache web server must generate a session ID long enough that it cannot be guessed through brute force - SessionCryptoCipherUnixDISA STIG Apache Server 2.4 Unix Server v2r3 Middleware
AS24-U1-000510 - The Apache web server must generate a session ID long enough that it cannot be guessed through brute force - SessionCryptoCipherUnixDISA STIG Apache Server 2.4 Unix Server v2r5 Middleware
AS24-U1-000510 - The Apache web server must generate a session ID long enough that it cannot be guessed through brute force - SessionCryptoCipherUnixDISA STIG Apache Server 2.4 Unix Server v2r3
AS24-U1-000510 - The Apache web server must generate a session ID long enough that it cannot be guessed through brute force - SessionCryptoCipherUnixDISA STIG Apache Server 2.4 Unix Server v2r5
AS24-U1-000510 - The Apache web server must generate a session ID long enough that it cannot be guessed through brute force - SessionCryptoCipherUnixDISA STIG Apache Server 2.4 Unix Server v2r7 Middleware
AS24-U1-000510 - The Apache web server must generate a session ID long enough that it cannot be guessed through brute force.UnixDISA STIG Apache Server 2.4 Unix Server v2r7
AS24-U1-000520 - The Apache web server must generate a session ID using as much of the character set as possible to reduce the risk of brute force.UnixDISA STIG Apache Server 2.4 Unix Server v2r3 Middleware
AS24-U1-000520 - The Apache web server must generate a session ID using as much of the character set as possible to reduce the risk of brute force.UnixDISA STIG Apache Server 2.4 Unix Server v2r5
AS24-U1-000520 - The Apache web server must generate a session ID using as much of the character set as possible to reduce the risk of brute force.UnixDISA STIG Apache Server 2.4 Unix Server v2r7
AS24-U1-000520 - The Apache web server must generate a session ID using as much of the character set as possible to reduce the risk of brute force.UnixDISA STIG Apache Server 2.4 Unix Server v2r3
AS24-U1-000520 - The Apache web server must generate a session ID using as much of the character set as possible to reduce the risk of brute force.UnixDISA STIG Apache Server 2.4 Unix Server v2r5 Middleware
AS24-U1-000520 - The Apache web server must generate a session ID using as much of the character set as possible to reduce the risk of brute force.UnixDISA STIG Apache Server 2.4 Unix Server v2r7 Middleware
AS24-U2-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - Header HttpOnly SecureUnixDISA STIG Apache Server 2.4 Unix Site v2r2
AS24-U2-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - Header HttpOnly SecureUnixDISA STIG Apache Server 2.4 Unix Site v2r1 Middleware
AS24-U2-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - Header HttpOnly SecureUnixDISA STIG Apache Server 2.4 Unix Site v2r2 Middleware
AS24-U2-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - Header HttpOnly SecureUnixDISA STIG Apache Server 2.4 Unix Site v2r1
AS24-U2-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application.UnixDISA STIG Apache Server 2.4 Unix Site v2r4
AS24-U2-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application.UnixDISA STIG Apache Server 2.4 Unix Site v2r4 Middleware
AS24-W1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - Header HttpOnly secureWindowsDISA STIG Apache Server 2.4 Windows Server v2r1
AS24-W1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - Header HttpOnly secureWindowsDISA STIG Apache Server 2.4 Windows Server v2r3
AS24-W1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - Header HttpOnly secureWindowsDISA STIG Apache Server 2.4 Windows Server v2r2
AS24-W1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - Javascript setCookieWindowsDISA STIG Apache Server 2.4 Windows Server v2r3
AS24-W1-000480 - The Apache web server must accept only system-generated session identifiers.WindowsDISA STIG Apache Server 2.4 Windows Server v2r2
AS24-W1-000480 - The Apache web server must accept only system-generated session identifiers.WindowsDISA STIG Apache Server 2.4 Windows Server v2r1
AS24-W1-000480 - The Apache web server must accept only system-generated session identifiers.WindowsDISA STIG Apache Server 2.4 Windows Server v2r3
AS24-W1-000500 - The Apache web server must generate unique session identifiers that cannot be reliably reproduced.WindowsDISA STIG Apache Server 2.4 Windows Server v2r1
AS24-W1-000500 - The Apache web server must generate unique session identifiers that cannot be reliably reproduced.WindowsDISA STIG Apache Server 2.4 Windows Server v2r2
AS24-W1-000500 - The Apache web server must generate unique session identifiers that cannot be reliably reproduced.WindowsDISA STIG Apache Server 2.4 Windows Server v2r3
AS24-W1-000530 - The Apache web server must generate unique session identifiers with definable entropy - SSLRandomSeed connectWindowsDISA STIG Apache Server 2.4 Windows Server v2r3