Skip to content

The application must implement replay-resistant authentication mechanisms for network access to nonprivileged accounts.

An XCCDF Rule

Description

A replay attack is a man-in-the-middle style attack which allows an attacker to repeat or alter a valid data transmission that may enable unauthorized access to the application. Authentication sessions between the authenticating client and the application server validating the user credentials must not be vulnerable to a replay attack. The protection methods selected to protect against a replay attack will vary according to the application architecture. An authentication process resists replay attacks if it is impractical to achieve a successful authentication by recording and replaying a previous authentication message. A nonprivileged account is any operating system account with authorizations of a nonprivileged user. Techniques used to address this include protocols using nonces (e.g., numbers generated for a specific one time use), challenges (e.g., TLS, WS_Security), and PKI certificates. Additional techniques include time-synchronous or challenge-response one-time authenticators.

ID
SV-222531r1015696_rule
Version
APSC-DV-001630
Severity
Medium
References
Updated

Remediation Templates

A Manual Procedure

Design and configure the application to utilize replay-resistant mechanisms when authenticating nonprivileged accounts.