Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
References
CCI
CCI-001188
CCI
CCI|CCI-001188
Title
Generate a unique session identifier for each session with organization-defined randomness requirements.
Reference Item Details
Reference:
CCI - DISA Control Correlation Identifier
Category:
2024
Audit Items
View all Reference Audit Items
Name
Plugin
Audit Name
AS24-U1-000030 - The Apache web server must use cryptography to protect the integrity of remote sessions - ssl_module
Unix
DISA STIG Apache Server 2.4 Unix Server v3r1 Middleware
AS24-U1-000030 - The Apache web server must use cryptography to protect the integrity of remote sessions - SSLProtocol
Unix
DISA STIG Apache Server 2.4 Unix Server v3r1 Middleware
AS24-U1-000030 - The Apache web server must use cryptography to protect the integrity of remote sessions.
Unix
DISA STIG Apache Server 2.4 Unix Server v3r1
AS24-U1-000510 - The Apache web server must generate a session ID long enough that it cannot be guessed through brute force - session_crypto
Unix
DISA STIG Apache Server 2.4 Unix Server v3r1 Middleware
AS24-U1-000510 - The Apache web server must generate a session ID long enough that it cannot be guessed through brute force - SessionCryptoCipher
Unix
DISA STIG Apache Server 2.4 Unix Server v3r1 Middleware
AS24-U1-000510 - The Apache web server must generate a session ID long enough that it cannot be guessed through brute force.
Unix
DISA STIG Apache Server 2.4 Unix Server v3r1
AS24-U1-000520 - The Apache web server must generate a session ID using as much of the character set as possible to reduce the risk of brute force.
Unix
DISA STIG Apache Server 2.4 Unix Server v3r1 Middleware
AS24-U1-000520 - The Apache web server must generate a session ID using as much of the character set as possible to reduce the risk of brute force.
Unix
DISA STIG Apache Server 2.4 Unix Server v3r1
AS24-W1-000480 - The Apache web server must accept only system-generated session identifiers.
Windows
DISA STIG Apache Server 2.4 Windows Server v2r3
AS24-W1-000480 - The Apache web server must accept only system-generated session identifiers.
Windows
DISA STIG Apache Server 2.4 Windows Server v3r1
AS24-W1-000500 - The Apache web server must generate unique session identifiers that cannot be reliably reproduced.
Windows
DISA STIG Apache Server 2.4 Windows Server v2r3
AS24-W1-000500 - The Apache web server must generate unique session identifiers that cannot be reliably reproduced.
Windows
DISA STIG Apache Server 2.4 Windows Server v3r1
AS24-W1-000530 - The Apache web server must generate unique session identifiers with definable entropy - ssl_module
Windows
DISA STIG Apache Server 2.4 Windows Server v2r3
AS24-W1-000530 - The Apache web server must generate unique session identifiers with definable entropy - ssl_module
Windows
DISA STIG Apache Server 2.4 Windows Server v3r1
AS24-W1-000530 - The Apache web server must generate unique session identifiers with definable entropy - SSLRandomSeed connect
Windows
DISA STIG Apache Server 2.4 Windows Server v2r3
AS24-W1-000530 - The Apache web server must generate unique session identifiers with definable entropy - SSLRandomSeed connect
Windows
DISA STIG Apache Server 2.4 Windows Server v3r1
AS24-W1-000530 - The Apache web server must generate unique session identifiers with definable entropy - SSLRandomSeed startup
Windows
DISA STIG Apache Server 2.4 Windows Server v3r1
AS24-W1-000530 - The Apache web server must generate unique session identifiers with definable entropy - SSLRandomSeed startup
Windows
DISA STIG Apache Server 2.4 Windows Server v2r3
AS24-W2-000500 - The Apache web server must generate unique session identifiers that cannot be reliably reproduced.
Windows
DISA STIG Apache Server 2.4 Windows Site v2r1
AS24-W2-000520 - The Apache web server must generate a session ID using as much of the character set as possible to reduce the risk of brute force.
Windows
DISA STIG Apache Server 2.4 Windows Site v2r1
CASA-VN-000610 - The Cisco ASA remote access VPN server must be configured to generate unique session identifiers using a FIPS-validated Random Number Generator (RNG) based on the Deterministic Random Bit Generators (DRBG) algorithm.
Cisco
DISA STIG Cisco ASA VPN v2r2
CD12-00-011400 - PostgreSQL must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values.
PostgreSQLDB
DISA STIG Crunchy Data PostgreSQL DB v3r1
DB2X-00-005100 - DB2 must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values
Windows
DISA STIG IBM DB2 v10.5 LUW v2r1 OS Windows
DB2X-00-005100 - DB2 must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values
Unix
DISA STIG IBM DB2 v10.5 LUW v2r1 OS Linux
DKER-EE-001070 - FIPS mode must be enabled on all Docker Engine - Enterprise nodes - docker info .SecurityOptions
Unix
DISA STIG Docker Enterprise 2.x Linux/Unix v2r2
FGFW-ND-000280 - The FortiGate device must generate unique session identifiers using a FIPS 140-2-approved random number generator.
FortiGate
DISA Fortigate Firewall NDM STIG v1r4
IIST-SI-000220 - A private IIS 10.0 website authentication mechanism must use client certificates to transmit session identifier to assure integrity.
Windows
DISA IIS 10.0 Site v2r10
IIST-SI-000223 - The IIS 10.0 website must generate unique session identifiers that cannot be reliably reproduced.
Windows
DISA IIS 10.0 Site v2r10
IISW-SI-000220 - A private websites authentication mechanism must use client certificates to transmit session identifier to assure integrity.
Windows
DISA IIS 8.5 Site v2r9
IISW-SI-000223 - The IIS 8.5 website must generate unique session identifiers that cannot be reliably reproduced.
Windows
DISA IIS 8.5 Site v2r9
MADB-10-004900 - MariaDB must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values.
MySQLDB
DISA MariaDB Enterprise 10.x v2r2 DB
MD3X-00-000410 - MongoDB must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values.
Unix
DISA STIG MongoDB Enterprise Advanced 3.x v2r3 OS
MD4X-00-003700 - MongoDB must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values.
Unix
DISA STIG MongoDB Enterprise Advanced 4.x v1r4 OS
MD7X-00-004900 MongoDB must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values.
Unix
DISA MongoDB Enterprise Advanced 7.x STIG v1r1
MYS8-00-007000 - The MySQL Database Server 8.0 must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values.
MySQLDB
DISA Oracle MySQL 8.0 v2r2 DB
PGS9-00-011400 - PostgreSQL must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values.
PostgreSQLDB
DISA STIG PostgreSQL 9.x on RHEL DB v2r5
SQL6-D0-009200 - SQL Server must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values.
Windows
DISA STIG SQL Server 2016 Instance OS Audit v3r2
TCAT-AS-000750 - Tomcat must use FIPS-validated ciphers on secured connectors.
Unix
DISA STIG Apache Tomcat Application Server 9 v3r1 Middleware
VCSA-70-000077 - The vCenter Server must enable FIPS-validated cryptography.
VMware
DISA STIG VMware vSphere 7.0 vCenter v1r3
VCSA-80-000077 The vCenter Server must enable FIPS-validated cryptography.
VMware
DISA VMware vSphere 8.0 vCenter STIG v2r1
WBSP-AS-001290 - WebSphere Application Server must utilize FIPS 140-2-approved encryption modules when authenticating users and processes.
Unix
DISA IBM WebSphere Traditional 9 STIG v1r1
WBSP-AS-001290 - WebSphere Application Server must utilize FIPS 140-2-approved encryption modules when authenticating users and processes.
Windows
DISA IBM WebSphere Traditional 9 Windows STIG v1r1
WBSP-AS-001290 - WebSphere Application Server must utilize FIPS 140-2-approved encryption modules when authenticating users and processes.
Unix
DISA IBM WebSphere Traditional 9 STIG v1r1 Middleware