SC 23 SESSION AUTHENTICITY - NIST-SP-800-53-R5/NIST-SP-800-53-R5.github.io GitHub Wiki
Control: Protect the authenticity of communications sessions.
Discussion: Protecting session authenticity addresses communications protection at the session level, not at the packet level. Such protection establishes grounds for confidence at both ends of communications sessions in the ongoing identities of other parties and the validity of transmitted information. Authenticity protection includes protecting against “man-in-the-middle” attacks, session hijacking, and the insertion of false information into sessions.
Related Controls: AU-10 , SC-8 , SC-10 , SC-11.
Control Enhancements:
-
(1) SESSION AUTHENTICITY / INVALIDATE SESSION IDENTIFIERS AT LOGOUT
Invalidate session identifiers upon user logout or other session termination.Discussion: Invalidating session identifiers at logout curtails the ability of adversaries to capture and continue to employ previously valid session IDs.
Related Controls: None.
-
(2) SESSION AUTHENTICITY / USER-INITIATED LOGOUTS AND MESSAGE DISPLAYS
[Withdrawn: Incorporated into AC-12(1).] -
(3) SESSION AUTHENTICITY / UNIQUE SYSTEM-GENERATED SESSION IDENTIFIERS
Generate a unique session identifier for each session with [ Assignment: organization-defined randomness requirements ] and recognize only session identifiers that are system-generated.Discussion: Generating unique session identifiers curtails the ability of adversaries to reuse previously valid session IDs. Employing the concept of randomness in the generation of unique session identifiers protects against brute-force attacks to determine future session identifiers.
Related Controls: AC-10 , SC-12 , SC-13.
-
(4) SESSION AUTHENTICITY / UNIQUE SESSION IDENTIFIERS WITH RANDOMIZATION
[Withdrawn: Incorporated into SC-23(3).] -
(5) SESSION AUTHENTICITY / ALLOWED CERTIFICATE AUTHORITIES
Only allow the use of [ Assignment: organization-defined certificate authorities ] for verification of the establishment of protected sessions.Discussion: Reliance on certificate authorities for the establishment of secure sessions includes the use of Transport Layer Security (TLS) certificates. These certificates, after verification by their respective certificate authorities, facilitate the establishment of protected sessions between web clients and web servers.
Related Controls: SC-12 , SC-13.
References: [SP 800-52], [SP 800-77], [SP 800-95], [SP 800-113].