Skip to content

The F5 BIG-IP appliance must be configured to enable the secure cookie flag.

An XCCDF Rule

Description

To guard against cookie hijacking, only the BIG-IP APM controller and client must be able to view the full session ID. Session cookies are set only after the SSL handshake between the BIG-IP APM system and the user has completed, ensuring that the session cookies are protected from interception with SSL encryption. To ensure that the client browser will not send session cookies unencrypted, the HTTP header that the BIG-IP APM uses when sending the session cookie is set with the secure option (default). This option is only applicable to the LTM+APM access profile type.

ID
SV-266163r1024393_rule
Version
F5BI-AP-300152
Severity
Low
References
Updated

Remediation Templates

A Manual Procedure

Configure each Access Profile to enable the Secure Cookies flag.

From the BIG-IP GUI:
1. Access.
2. Profiles/Policies.
3. Access Profiles.