Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
References
CCI
CCI-001664
CCI
CCI|CCI-001664
Title
Recognize only session identifiers that are system-generated.
Reference Item Details
Reference:
CCI - DISA Control Correlation Identifier
Category:
2024
Audit Items
View all Reference Audit Items
Name
Plugin
Audit Name
AS24-U1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - httpd
Unix
DISA STIG Apache Server 2.4 Unix Server v3r1 Middleware
AS24-U1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - SessionCookieName Domain
Unix
DISA STIG Apache Server 2.4 Unix Server v3r1 Middleware
AS24-U1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - SessionCookieName HttpOnly Secure
Unix
DISA STIG Apache Server 2.4 Unix Server v3r1 Middleware
AS24-U1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application.
Unix
DISA STIG Apache Server 2.4 Unix Server v3r1
AS24-U1-000520 - The Apache web server must generate a session ID using as much of the character set as possible to reduce the risk of brute force.
Unix
DISA STIG Apache Server 2.4 Unix Server v3r1 Middleware
AS24-U1-000520 - The Apache web server must generate a session ID using as much of the character set as possible to reduce the risk of brute force.
Unix
DISA STIG Apache Server 2.4 Unix Server v3r1
AS24-U2-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application.
Unix
DISA STIG Apache Server 2.4 Unix Site v2r4 Middleware
AS24-U2-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application.
Unix
DISA STIG Apache Server 2.4 Unix Site v2r4
AS24-W1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - Header HttpOnly secure
Windows
DISA STIG Apache Server 2.4 Windows Server v2r3
AS24-W1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - Header HttpOnly secure
Windows
DISA STIG Apache Server 2.4 Windows Server v3r1
AS24-W1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - Javascript setCookie
Windows
DISA STIG Apache Server 2.4 Windows Server v2r3
AS24-W1-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - Javascript setCookie
Windows
DISA STIG Apache Server 2.4 Windows Server v3r1
AS24-W1-000480 - The Apache web server must accept only system-generated session identifiers.
Windows
DISA STIG Apache Server 2.4 Windows Server v2r3
AS24-W1-000480 - The Apache web server must accept only system-generated session identifiers.
Windows
DISA STIG Apache Server 2.4 Windows Server v3r1
AS24-W2-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - Header HttpOnly Secure
Windows
DISA STIG Apache Server 2.4 Windows Site v2r1
AS24-W2-000470 - Cookies exchanged between the Apache web server and client, such as session cookies, must have security settings that disallow cookie access outside the originating Apache web server and hosted application - Javascript setCookie
Windows
DISA STIG Apache Server 2.4 Windows Site v2r1
AS24-W2-000480 - The Apache web server must accept only system-generated session identifiers.
Windows
DISA STIG Apache Server 2.4 Windows Site v2r1
F5BI-AP-000241 - When the Access Profile Type is LTM+APM and it is not using any connectivity resources (such as Network Access, Portal Access, etc.) in the VPE, the F5 BIG-IP appliance must be configured to enable the HTTP Only flag.
F5
DISA F5 BIG-IP Access Policy Manager STIG v2r3
F5BI-AP-000242 - The F5 BIG-IP appliance must be configured to enable the 'Secure' cookie flag.
F5
DISA F5 BIG-IP Access Policy Manager STIG v2r3
F5BI-AP-000243 - The F5 BIG-IP appliance must be configured to disable the 'Persistent' cookie flag.
F5
DISA F5 BIG-IP Access Policy Manager STIG v2r3
IIST-SV-000134 - The IIS 10.0 web server must use cookies to track session state.
Windows
DISA IIS 10.0 Server v2r10
IIST-SV-000134 - The IIS 10.0 web server must use cookies to track session state.
Windows
DISA IIS 10.0 Server v3r2
IIST-SV-000135 - The IIS 10.0 web server must accept only system-generated session identifiers.
Windows
DISA IIS 10.0 Server v3r2
IIST-SV-000135 - The IIS 10.0 web server must accept only system-generated session identifiers.
Windows
DISA IIS 10.0 Server v2r10
IISW-SV-000134 - The IIS 8.5 web server must use cookies to track session state.
Windows
DISA IIS 8.5 Server v2r7
IISW-SV-000135 - The IIS 8.5 web server must limit the amount of time a cookie persists.
Windows
DISA IIS 8.5 Server v2r7
TCAT-AS-000820 - Tomcat must be configured to limit data exposure between applications.
Unix
DISA STIG Apache Tomcat Application Server 9 v3r1 Middleware
VCEM-70-000004 - ESX Agent Manager must protect cookies from cross-site scripting (XSS).
Unix
DISA STIG VMware vSphere 7.0 EAM Tomcat v1r2
VCFL-67-000004 - vSphere Client must protect cookies from XSS.
Unix
DISA STIG VMware vSphere 6.7 Virgo Client v1r2
VCLU-70-000004 - Lookup Service must protect cookies from cross-site scripting (XSS) - XSS.
Unix
DISA STIG VMware vSphere 7.0 Lookup Service v1r2
VCLU-80-000057 The vCenter Lookup service must be configured to limit data exposure between applications.
Unix
DISA VMware vSphere 8.0 vCenter Appliance Lookup Service STIG v2r1
VCPF-80-000057 The vCenter Perfcharts service must be configured to limit data exposure between applications.
Unix
DISA VMware vSphere 8.0 vCenter Appliance Perfcharts STIG v2r1
VCST-67-000004 - The Security Token Service must protect cookies from XSS.
Unix
DISA STIG VMware vSphere 6.7 STS Tomcat v1r3
VCST-70-000004 - The Security Token Service must protect cookies from cross-site scripting (XSS).
Unix
DISA STIG VMware vSphere 7.0 STS Tomcat v1r2
VCST-80-000057 The vCenter STS service must be configured to limit data exposure between applications.
Unix
DISA VMware vSphere 8.0 vCenter Appliance Secure Token Service (STS) STIG v2r1
VCUI-67-000032 - vSphere UI must restrict its cookie path.
Unix
DISA STIG VMware vSphere 6.7 UI Tomcat v1r3
VCUI-70-000018 - vSphere UI must restrict its cookie path.
Unix
DISA STIG VMware vSphere 7.0 vCA UI v1r2
VCUI-80-000057 The vCenter UI service must be configured to limit data exposure between applications.
Unix
DISA VMware vSphere 8.0 vCenter Appliance User Interface (UI) STIG v2r1