DISA STIGS Viewer

The application must ensure encrypted assertions, or equivalent confidentiality protections are used when assertion data is passed through an intermediary, and confidentiality of the assertion data is required when passing through the intermediary.

Overview

Finding ID Version Rule ID IA Controls Severity
V-222402 APSC-DV-000220 SV-222402r960759_rule   Medium
Description
STIG Date
Application Security and Development Security Technical Implementation Guide 2025-02-12

Details

Check Text (C-24072r493114_chk)
Ask the application representative for the design document.

Review the design document for web services using WS-Security tokens.

If the application does not utilize WS-Security tokens, this check is not applicable.

Verify all WS-Security tokens are transmitted via an approved encryption method.

If the design document does not exist, or does not indicate all WS-Security tokens are only transmitted via an approved encryption method, this is a finding.
Fix Text (F-24061r493115_fix)
Encrypt assertions or use equivalent confidentiality when sensitive assertion data is passed through an intermediary.