CCI-001188
Generate a unique session identifier for each session with organization-defined randomness requirements.
The CA API Gateway must generate unique session identifiers using a FIPS 140-2 approved random number generator.
1 rule found Severity: Medium

The FortiGate device must generate unique session identifiers using a FIPS 140-2-approved random number generator.
1 rule found Severity: Medium

The network device must generate unique session identifiers using a FIPS 140-2 approved random number generator.
2 rules found Severity: Medium

The DataPower Gateway must generate unique session identifiers using a FIPS 140-2 approved random number generator.
1 rule found Severity: Medium

DB2 must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values.
1 rule found Severity: Medium

The MQ Appliance messaging server must generate a unique session identifier using a FIPS 140-2 approved random number generator.
1 rule found Severity: Medium

The WebSphere Application Server must utilize FIPS 140-2-approved encryption modules when authenticating users and processes.
1 rule found Severity: Medium

The MQ Appliance network device must generate unique session identifiers using a FIPS 140-2 approved random number generator.
1 rule found Severity: Medium

MobileIron Sentry must generate unique session identifiers using a FIPS 140-2 approved random number generator.
1 rule found Severity: Medium

Riverbed Optimization System (RiOS) must generate unique session identifiers using a FIPS 140-2 approved random number generator.
1 rule found Severity: Medium

MongoDB must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values.
3 rules found Severity: Medium

PostgreSQL must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values.
3 rules found Severity: Medium

The Cisco ASA remote access VPN server must be configured to generate unique session identifiers using a FIPS-validated Random Number Generator (RNG) based on the Deterministic Random Bit Generators (DRBG) algorithm.
1 rule found Severity: Medium

The Cisco ISE must generate unique session identifiers using a FIPS 140-2 approved Random Number Generator (RNG) using DRGB.
1 rule found Severity: Medium

The WebSphere Liberty Server must use FIPS 140-2 approved encryption modules when authenticating users and processes.
1 rule found Severity: High

The ICS must be configured to audit the execution of privileged functions such as accounts additions and changes.
1 rule found Severity: Medium

Sentry must generate unique session identifiers using a FIPS 140-2 approved random number generator.
1 rule found Severity: Medium

MarkLogic Server must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values.
1 rule found Severity: Medium

A private IIS 10.0 website authentication mechanism must use client certificates to transmit session identifier to assure integrity.
1 rule found Severity: Medium

1 rule found Severity: Medium

The MySQL Database Server 8.0 must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values.
1 rule found Severity: Medium

The Riverbed NetProfiler must be configured to implement cryptographic mechanisms using a FIPS 140-2/140-3 validated algorithm to protect the confidentiality and integrity of all cryptographic functions.
1 rule found Severity: High

Automation Controller must implement cryptography mechanisms to protect the integrity of information.
1 rule found Severity: High

Redis Enterprise DBMS must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values.
1 rule found Severity: Medium

The web server must generate a unique session identifier for each session using a FIPS 140-2 approved random number generator.
1 rule found Severity: High

1 rule found Severity: Medium

The web server must generate a session ID long enough that it cannot be guessed through brute force.
1 rule found Severity: Medium

The web server must generate a session ID using as much of the character set as possible to reduce the risk of brute force.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The Apache web server must generate a session ID long enough that it cannot be guessed through brute force.
1 rule found Severity: Medium

The Apache web server must generate a session ID using as much of the character set as possible to reduce the risk of brute force.
1 rule found Severity: High

1 rule found Severity: Medium

2 rules found Severity: Medium

1 rule found Severity: Medium

The Apache web server must generate a session ID using as much of the character set as possible to reduce the risk of brute force.
1 rule found Severity: Medium

The ALG must generate unique session identifiers using a FIPS 140-2 approved random number generator.
1 rule found Severity: Medium

The application server must generate a unique session identifier using a FIPS 140-2 approved random number generator.
1 rule found Severity: High

The application must generate a unique session identifier using a FIPS 140-2/140-3 approved random number generator.
1 rule found Severity: Medium

The DBMS must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values.
1 rule found Severity: Medium

1 rule found Severity: High

The HYCU virtual appliance must generate unique session identifiers using a FIPS 140-2 approved random number generator.
1 rule found Severity: Medium

MariaDB must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values.
1 rule found Severity: Medium

SQL Server must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values.
1 rule found Severity: Medium

The UEM server must generate unique session identifiers using a FIPS-validated Random Number Generator (RNG) based on the Deterministic Random Bit Generators (DRBG) algorithm.
1 rule found Severity: High

The VPN Gateway must generate unique session identifiers using FIPS-validated Random Number Generator (RNG) based on the Deterministic Random Bit Generators (DRBG) algorithm.
1 rule found Severity: Medium

The vCenter PostgreSQL service must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values.
1 rule found Severity: Medium
