SlideShare a Scribd company logo
PAGE 1 OF 47
MTF_ENTERPRISE Scan Report
Project Name MTF_ENTERPRISE
Scan Start Tuesday, July 30, 2024 8:34:45 AM
Preset Checkmarx Default
Scan Time 00h:01m:57s
Lines Of Code Scanned 680003
Files Scanned 21712
Report Creation Time Tuesday, July 30, 2024 8:52:27 AM
Online Results
https://mti.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=103
8897&projectid=84
Team CxServer
Checkmarx Version 9.5.5.1002 HF16
Scan Type Incremental
Source Origin LocalPath
Density 5/1000 (Vulnerabilities/LOC)
Visibility Public
Filter Settings
Severity
Included: High, Medium, Low, Information
Excluded: None
Result State
Included: To Verify, Not Exploitable, Confirmed, Urgent, Proposed Not Exploitable
Excluded: None
Assigned to
Included: All
Categories
Included:
Uncategorized All
Custom All
PCI DSS v3.2.1 All
OWASP Top 10
2013
All
FISMA 2014 All
NIST SP 800-53 All
OWASP Top 10
2017
All
OWASP Mobile Top
10 2016
All
ASD STIG 4.10 All
OWASP Top 10 API All
OWASP Top 10
2010
All
CWE top 25 All
MOIS(KISA) Secure
Coding 2021
All
PAGE 2 OF 47
OWASP ASVS All
OWASP Top 10
2021
All
SANS top 25 All
ASA Mobile
Premium
All
ASA Premium All
ASD STIG 5.2 All
Top Tier All
Excluded:
Uncategorized None
Custom None
PCI DSS v3.2.1 None
OWASP Top 10
2013
None
FISMA 2014 None
NIST SP 800-53 None
OWASP Top 10
2017
None
OWASP Mobile Top
10 2016
None
ASD STIG 4.10 None
OWASP Top 10 API None
OWASP Top 10
2010
None
CWE top 25 None
MOIS(KISA) Secure
Coding 2021
None
OWASP ASVS None
OWASP Top 10
2021
None
SANS top 25 None
ASA Mobile
Premium
None
ASA Premium None
ASD STIG 5.2 None
Top Tier None
Results Limit
A limit was not defined
Selected Queries
Selected queries are listed in Result Summary
PAGE 3 OF 47
Result Summary Most Vulnerable Files
High
Medium
Low
RedisCacheService.c
s
CustomerHierarchyS
ervice.cs
CachingServiceBase.
cs
CompanyController.c
s
UserController.cs
Top 5 Vulnerabilities
PAGE 4 OF 47
Scan Summary - OWASP Top 10 2017
Further details and elaboration about vulnerabilities and risks can be found at: OWASP Top 10 2017
Category
Threat
Agent
Exploitability
Weakness
Prevalence
Weakness
Detectability
Technical
Impact
Business
Impact
Issues
Found
Best Fix
Locations
A1-Injection*
App.
Specific
EASY COMMON EASY SEVERE
App.
Specific
2122 222
A2-Broken
Authentication*
App.
Specific
EASY COMMON AVERAGE SEVERE
App.
Specific
27 27
A3-Sensitive
Data Exposure*
App.
Specific
AVERAGE WIDESPREAD AVERAGE SEVERE
App.
Specific
124 31
A4-XML External
Entities (XXE)
App.
Specific
AVERAGE COMMON EASY SEVERE
App.
Specific
0 0
A5-Broken
Access Control*
App.
Specific
AVERAGE COMMON AVERAGE SEVERE
App.
Specific
4 3
A6-Security
Misconfiguration
*
App.
Specific
EASY WIDESPREAD EASY MODERATE
App.
Specific
17 17
A7-Cross-Site
Scripting
(XSS)*
App.
Specific
EASY WIDESPREAD EASY MODERATE
App.
Specific
142 70
A8-Insecure
Deserialization
App.
Specific
DIFFICULT COMMON AVERAGE SEVERE
App.
Specific
0 0
A9-Using
Components
with Known
Vulnerabilities*
App.
Specific
AVERAGE WIDESPREAD AVERAGE MODERATE
App.
Specific
229 229
A10-Insufficient
Logging &
Monitoring
App.
Specific
AVERAGE WIDESPREAD DIFFICULT MODERATE
App.
Specific
0 0
* Project scan results do not include all relevant queries. Presets andor Filters should be changed to include all relevant
standard queries.
PAGE 5 OF 47
Scan Summary - OWASP Top 10 2021
Category
Issues
Found
Best Fix
Locations
A1-Broken Access Control* 440 221
A2-Cryptographic Failures* 12 12
A3-Injection* 137 64
A4-Insecure Design* 239 239
A5-Security Misconfiguration* 35 35
A6-Vulnerable and Outdated Components* 229 229
A7-Identification and Authentication Failures* 31 31
A8-Software and Data Integrity Failures* 35 31
A9-Security Logging and Monitoring Failures* 2872 973
A10-Server-Side Request Forgery 0 0
* Project scan results do not include all relevant queries. Presets andor Filters should be changed to include all relevant
standard queries.
PAGE 6 OF 47
Scan Summary - OWASP Top 10 2013
Further details and elaboration about vulnerabilities and risks can be found at: OWASP Top 10 2013
Category
Threat
Agent
Attack
Vectors
Weakness
Prevalence
Weakness
Detectability
Technical
Impact
Business
Impact
Issues
Found
Best Fix
Locations
A1-Injection*
EXTERNAL,
INTERNAL,
ADMIN
USERS
EASY COMMON AVERAGE SEVERE ALL DATA 6 5
A2-Broken
Authentication
and Session
Management*
EXTERNAL,
INTERNAL
USERS
AVERAGE WIDESPREAD AVERAGE SEVERE
AFFECTED
DATA AND
FUNCTIONS
27 27
A3-Cross-Site
Scripting
(XSS)*
EXTERNAL,
INTERNAL,
ADMIN
USERS
AVERAGE
VERY
WIDESPREAD
EASY MODERATE
AFFECTED
DATA AND
SYSTEM
142 70
A4-Insecure
Direct Object
References*
SYSTEM
USERS
EASY COMMON EASY MODERATE
EXPOSED
DATA
4 3
A5-Security
Misconfiguration
*
EXTERNAL,
INTERNAL,
ADMIN
USERS
EASY COMMON EASY MODERATE
ALL DATA
AND
SYSTEM
6 6
A6-Sensitive
Data Exposure*
EXTERNAL,
INTERNAL,
ADMIN
USERS,
USERS
BROWSERS
DIFFICULT UNCOMMON AVERAGE SEVERE
EXPOSED
DATA
123 30
A7-Missing
Function Level
Access Control*
EXTERNAL,
INTERNAL
USERS
EASY COMMON AVERAGE MODERATE
EXPOSED
DATA AND
FUNCTIONS
0 0
A8-Cross-Site
Request Forgery
(CSRF)*
USERS
BROWSERS
AVERAGE COMMON EASY MODERATE
AFFECTED
DATA AND
FUNCTIONS
109 109
A9-Using
Components
with Known
Vulnerabilities*
EXTERNAL
USERS,
AUTOMATED
TOOLS
AVERAGE WIDESPREAD DIFFICULT MODERATE
AFFECTED
DATA AND
FUNCTIONS
229 229
A10-Unvalidated
Redirects and
Forwards
USERS
BROWSERS
AVERAGE WIDESPREAD DIFFICULT MODERATE
AFFECTED
DATA AND
FUNCTIONS
108 33
* Project scan results do not include all relevant queries. Presets andor Filters should be changed to include all relevant
standard queries.
PAGE 7 OF 47
Scan Summary - PCI DSS v3.2.1
Category
Issues
Found
Best Fix
Locations
PCI DSS (3.2.1) - 6.5.1 - Injection flaws - particularly SQL injection* 2229 236
PCI DSS (3.2.1) - 6.5.2 - Buffer overflows* 0 0
PCI DSS (3.2.1) - 6.5.3 - Insecure cryptographic storage* 28 28
PCI DSS (3.2.1) - 6.5.4 - Insecure communications* 1 1
PCI DSS (3.2.1) - 6.5.5 - Improper error handling* 204 204
PCI DSS (3.2.1) - 6.5.7 - Cross-site scripting (XSS)* 122 50
PCI DSS (3.2.1) - 6.5.8 - Improper access control* 123 22
PCI DSS (3.2.1) - 6.5.9 - Cross-site request forgery* 109 109
PCI DSS (3.2.1) - 6.5.10 - Broken authentication and session management* 0 0
* Project scan results do not include all relevant queries. Presets andor Filters should be changed to include all relevant
standard queries.
PAGE 8 OF 47
Scan Summary - FISMA 2014
Category Description
Issues
Found
Best Fix
Locations
Access Control
Organizations must limit information system
access to authorized users, processes acting
on behalf of authorized users, or devices
(including other information systems) and to
the types of transactions and functions that
authorized users are permitted to exercise.
109 44
Audit And Accountability*
Organizations must: (i) create, protect, and
retain information system audit records to
the extent needed to enable the monitoring,
analysis, investigation, and reporting of
unlawful, unauthorized, or inappropriate
information system activity; and (ii) ensure
that the actions of individual information
system users can be uniquely traced to those
users so they can be held accountable for
their actions.
0 0
Configuration Management*
Organizations must: (i) establish and
maintain baseline configurations and
inventories of organizational information
systems (including hardware, software,
firmware, and documentation) throughout
the respective system development life
cycles; and (ii) establish and enforce security
configuration settings for information
technology products employed in
organizational information systems.
22 22
Identification And Authentication*
Organizations must identify information
system users, processes acting on behalf of
users, or devices and authenticate (or verify)
the identities of those users, processes, or
devices, as a prerequisite to allowing access
to organizational information systems.
139 46
Media Protection*
Organizations must: (i) protect information
system media, both paper and digital; (ii)
limit access to information on information
system media to authorized users; and (iii)
sanitize or destroy information system media
before disposal or release for reuse.
0 0
System And Communications Protection
Organizations must: (i) monitor, control, and
protect organizational communications (i.e.,
information transmitted or received by
organizational information systems) at the
external boundaries and key internal
boundaries of the information systems; and
(ii) employ architectural designs, software
development techniques, and systems
engineering principles that promote effective
information security within organizational
information systems.
10 10
System And Information Integrity*
Organizations must: (i) identify, report, and
correct information and information system
flaws in a timely manner; (ii) provide
protection from malicious code at appropriate
locations within organizational information
systems; and (iii) monitor information
system security alerts and advisories and
take appropriate actions in response.
2267 285
* Project scan results do not include all relevant queries. Presets andor Filters should be changed to include all relevant
standard queries.
PAGE 9 OF 47
Scan Summary - NIST SP 800-53
Category
Issues
Found
Best Fix
Locations
AC-12 Session Termination (P2) 0 0
AC-3 Access Enforcement (P1) 0 0
AC-4 Information Flow Enforcement (P1) 0 0
AC-6 Least Privilege (P1) 0 0
AU-9 Protection of Audit Information (P1)* 2114 215
CM-6 Configuration Settings (P2) 0 0
IA-5 Authenticator Management (P1) 0 0
IA-6 Authenticator Feedback (P2) 0 0
IA-8 Identification and Authentication (Non-Organizational Users) (P1) 0 0
SC-12 Cryptographic Key Establishment and Management (P1) 0 0
SC-13 Cryptographic Protection (P1) 1 1
SC-17 Public Key Infrastructure Certificates (P1) 0 0
SC-18 Mobile Code (P2) 30 26
SC-23 Session Authenticity (P1)* 109 109
SC-28 Protection of Information at Rest (P1)* 27 27
SC-4 Information in Shared Resources (P1) 109 16
SC-5 Denial of Service Protection (P1)* 193 193
SC-8 Transmission Confidentiality and Integrity (P1) 14 14
SI-10 Information Input Validation (P1)* 143 67
SI-11 Error Handling (P2)* 14 14
SI-15 Information Output Filtering (P0)* 122 50
SI-16 Memory Protection (P1)* 0 0
* Project scan results do not include all relevant queries. Presets andor Filters should be changed to include all relevant
standard queries.
PAGE 10 OF 47
Scan Summary - OWASP Mobile Top 10 2016
Category Description
Issues
Found
Best Fix
Locations
M1-Improper Platform Usage
This category covers misuse of a platform
feature or failure to use platform security
controls. It might include Android intents,
platform permissions, misuse of TouchID, the
Keychain, or some other security control that
is part of the mobile operating system. There
are several ways that mobile apps can
experience this risk.
0 0
M2-Insecure Data Storage*
This category covers insecure data storage
and unintended data leakage.
0 0
M3-Insecure Communication*
This category covers poor handshaking,
incorrect SSL versions, weak negotiation,
cleartext communication of sensitive assets,
etc.
0 0
M4-Insecure Authentication*
This category captures notions of
authenticating the end user or bad session
management. This can include:
-Failing to identify the user at all when that
should be required
-Failure to maintain the user's identity when
it is required
-Weaknesses in session management
0 0
M5-Insufficient Cryptography
The code applies cryptography to a sensitive
information asset. However, the
cryptography is insufficient in some way.
Note that anything and everything related to
TLS or SSL goes in M3. Also, if the app fails
to use cryptography at all when it should,
that probably belongs in M2. This category is
for issues where cryptography was
attempted, but it wasnt done correctly.
0 0
M6-Insecure Authorization
This is a category to capture any failures in
authorization (e.g., authorization decisions in
the client side, forced browsing, etc.). It is
distinct from authentication issues (e.g.,
device enrolment, user identification, etc.).
If the app does not authenticate users at all
in a situation where it should (e.g., granting
anonymous access to some resource or
service when authenticated and authorized
access is required), then that is an
authentication failure not an authorization
failure.
0 0
M7-Client Code Quality*
This category is the catch-all for code-level
implementation problems in the mobile
client. That's distinct from server-side coding
mistakes. This would capture things like
buffer overflows, format string vulnerabilities,
and various other code-level mistakes where
the solution is to rewrite some code that's
running on the mobile device.
0 0
M8-Code Tampering
This category covers binary patching, local
resource modification, method hooking,
method swizzling, and dynamic memory
modification. Once the application is
delivered to the mobile device, the code and
data resources are resident there. An
attacker can either directly modify the code,
change the contents of memory dynamically,
change or replace the system APIs that the
0 0
PAGE 11 OF 47
application uses, or modify the application's
data and resources. This can provide the
attacker a direct method of subverting the
intended use of the software for personal or
monetary gain.
M9-Reverse Engineering*
This category includes analysis of the final
core binary to determine its source code,
libraries, algorithms, and other assets.
Software such as IDA Pro, Hopper, otool, and
other binary inspection tools give the
attacker insight into the inner workings of the
application. This may be used to exploit other
nascent vulnerabilities in the application, as
well as revealing information about back end
servers, cryptographic constants and ciphers,
and intellectual property.
0 0
M10-Extraneous Functionality*
Often, developers include hidden backdoor
functionality or other internal development
security controls that are not intended to be
released into a production environment. For
example, a developer may accidentally
include a password as a comment in a hybrid
app. Another example includes disabling of 2-
factor authentication during testing.
0 0
* Project scan results do not include all relevant queries. Presets andor Filters should be changed to include all relevant
standard queries.
PAGE 12 OF 47
Scan Summary - Custom
Category
Issues
Found
Best Fix
Locations
Must audit 0 0
Check 0 0
Optional 0 0
PAGE 13 OF 47
Scan Summary - ASD STIG 4.10
Category
Issues
Found
Best Fix
Locations
APSC-DV-000640 - CAT II The application must provide audit record generation capability
for the renewal of session IDs.
0 0
APSC-DV-000650 - CAT II The application must not write sensitive data into the application
logs.
0 0
APSC-DV-000660 - CAT II The application must provide audit record generation capability
for session timeouts.
0 0
APSC-DV-000670 - CAT II The application must record a time stamp indicating when the
event occurred.
0 0
APSC-DV-000680 - CAT II The application must provide audit record generation capability
for HTTP headers including User-Agent, Referer, GET, and POST.
0 0
APSC-DV-000690 - CAT II The application must provide audit record generation capability
for connecting system IP addresses.
0 0
APSC-DV-000700 - CAT II The application must record the username or user ID of the user
associated with the event.
0 0
APSC-DV-000710 - CAT II The application must generate audit records when
successful/unsuccessful attempts to grant privileges occur.
0 0
APSC-DV-000720 - CAT II The application must generate audit records when
successful/unsuccessful attempts to access security objects occur.
0 0
APSC-DV-000730 - CAT II The application must generate audit records when
successful/unsuccessful attempts to access security levels occur.
0 0
APSC-DV-000740 - CAT II The application must generate audit records when
successful/unsuccessful attempts to access categories of information (e.g., classification
levels) occur.
0 0
APSC-DV-000750 - CAT II The application must generate audit records when
successful/unsuccessful attempts to modify privileges occur.
0 0
APSC-DV-000760 - CAT II The application must generate audit records when
successful/unsuccessful attempts to modify security objects occur.
0 0
APSC-DV-000770 - CAT II The application must generate audit records when
successful/unsuccessful attempts to modify security levels occur.
0 0
APSC-DV-000780 - CAT II The application must generate audit records when
successful/unsuccessful attempts to modify categories of information (e.g., classification
levels) occur.
0 0
APSC-DV-000790 - CAT II The application must generate audit records when
successful/unsuccessful attempts to delete privileges occur.
0 0
APSC-DV-000800 - CAT II The application must generate audit records when
successful/unsuccessful attempts to delete security levels occur.
0 0
APSC-DV-000810 - CAT II The application must generate audit records when
successful/unsuccessful attempts to delete application database security objects occur.
0 0
APSC-DV-000820 - CAT II The application must generate audit records when
successful/unsuccessful attempts to delete categories of information (e.g., classification
levels) occur.
0 0
APSC-DV-000830 - CAT II The application must generate audit records when
successful/unsuccessful logon attempts occur.
0 0
APSC-DV-000840 - CAT II The application must generate audit records for privileged
activities or other system-level access.
0 0
APSC-DV-000850 - CAT II The application must generate audit records showing starting and
ending time for user access to the system.
0 0
APSC-DV-000860 - CAT II The application must generate audit records when
successful/unsuccessful accesses to objects occur.
0 0
PAGE 14 OF 47
APSC-DV-000870 - CAT II The application must generate audit records for all direct access
to the information system.
0 0
APSC-DV-000880 - CAT II The application must generate audit records for all account
creations, modifications, disabling, and termination events.
0 0
APSC-DV-000910 - CAT II The application must initiate session auditing upon startup. 0 0
APSC-DV-000940 - CAT II The application must log application shutdown events. 0 0
APSC-DV-000950 - CAT II The application must log destination IP addresses. 0 0
APSC-DV-000960 - CAT II The application must log user actions involving access to data. 0 0
APSC-DV-000970 - CAT II The application must log user actions involving changes to data. 0 0
APSC-DV-000980 - CAT II The application must produce audit records containing
information to establish when (date and time) the events occurred.
0 0
APSC-DV-000990 - CAT II The application must produce audit records containing enough
information to establish which component, feature or function of the application triggered
the audit event.
0 0
APSC-DV-001000 - CAT II When using centralized logging; the application must include a
unique identifier in order to distinguish itself from other application logs.
0 0
APSC-DV-001010 - CAT II The application must produce audit records that contain
information to establish the outcome of the events.
0 0
APSC-DV-001020 - CAT II The application must generate audit records containing
information that establishes the identity of any individual or process associated with the
event.
0 0
APSC-DV-001030 - CAT II The application must generate audit records containing the full-
text recording of privileged commands or the individual identities of group account users.
0 0
APSC-DV-001040 - CAT II The application must implement transaction recovery logs when
transaction based.
0 0
APSC-DV-001050 - CAT II The application must provide centralized management and
configuration of the content to be captured in audit records generated by all application
components.
0 0
APSC-DV-001070 - CAT II The application must off-load audit records onto a different
system or media than the system being audited.
0 0
APSC-DV-001080 - CAT II The application must be configured to write application logs to a
centralized log repository.
0 0
APSC-DV-001090 - CAT II The application must provide an immediate warning to the SA
and ISSO (at a minimum) when allocated audit record storage volume reaches 75% of
repository maximum audit record storage capacity.
0 0
APSC-DV-001100 - CAT II Applications categorized as having a moderate or high impact
must provide an immediate real-time alert to the SA and ISSO (at a minimum) for all audit
failure events.
0 0
APSC-DV-001110 - CAT II The application must alert the ISSO and SA (at a minimum) in
the event of an audit processing failure.
0 0
APSC-DV-001120 - CAT II The application must shut down by default upon audit failure
(unless availability is an overriding concern).
0 0
APSC-DV-001130 - CAT II The application must provide the capability to centrally review
and analyze audit records from multiple components within the system.
0 0
APSC-DV-001140 - CAT II The application must provide the capability to filter audit records
for events of interest based upon organization-defined criteria.
0 0
APSC-DV-001150 - CAT II The application must provide an audit reduction capability that
supports on-demand reporting requirements.
0 0
APSC-DV-001160 - CAT II The application must provide an audit reduction capability that
supports on-demand audit review and analysis.
0 0
APSC-DV-001170 - CAT II The application must provide an audit reduction capability that
supports after-the-fact investigations of security incidents.
0 0
APSC-DV-001180 - CAT II The application must provide a report generation capability that
supports on-demand audit review and analysis.
0 0
APSC-DV-001190 - CAT II The application must provide a report generation capability that 0 0
PAGE 15 OF 47
supports on-demand reporting requirements.
APSC-DV-001200 - CAT II The application must provide a report generation capability that
supports after-the-fact investigations of security incidents.
0 0
APSC-DV-001210 - CAT II The application must provide an audit reduction capability that
does not alter original content or time ordering of audit records.
0 0
APSC-DV-001220 - CAT II The application must provide a report generation capability that
does not alter original content or time ordering of audit records.
0 0
APSC-DV-001250 - CAT II The applications must use internal system clocks to generate
time stamps for audit records.
0 0
APSC-DV-001260 - CAT II The application must record time stamps for audit records that
can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
0 0
APSC-DV-001270 - CAT II The application must record time stamps for audit records that
meet a granularity of one second for a minimum degree of precision.
0 0
APSC-DV-001280 - CAT II The application must protect audit information from any type of
unauthorized read access.
0 0
APSC-DV-001290 - CAT II The application must protect audit information from unauthorized
modification.
0 0
APSC-DV-001300 - CAT II The application must protect audit information from unauthorized
deletion.
0 0
APSC-DV-001310 - CAT II The application must protect audit tools from unauthorized
access.
0 0
APSC-DV-001320 - CAT II The application must protect audit tools from unauthorized
modification.
0 0
APSC-DV-001330 - CAT II The application must protect audit tools from unauthorized
deletion.
0 0
APSC-DV-001340 - CAT II The application must back up audit records at least every seven
days onto a different system or system component than the system or component being
audited.
0 0
APSC-DV-001570 - CAT II The application must electronically verify Personal Identity
Verification (PIV) credentials.
0 0
APSC-DV-001350 - CAT II The application must use cryptographic mechanisms to protect
the integrity of audit information.
0 0
APSC-DV-001360 - CAT II Application audit tools must be cryptographically hashed. 0 0
APSC-DV-001370 - CAT II The integrity of the audit tools must be validated by checking the
files for changes in the cryptographic hash value.
0 0
APSC-DV-001390 - CAT II The application must prohibit user installation of software without
explicit privileged status.
0 0
APSC-DV-001410 - CAT II The application must enforce access restrictions associated with
changes to application configuration.
0 0
APSC-DV-001420 - CAT II The application must audit who makes configuration changes to
the application.
0 0
APSC-DV-001430 - CAT II The application must have the capability to prevent the
installation of patches, service packs, or application components without verification the
software component has been digitally signed using a certificate that is recognized and
approved by the orga
0 0
APSC-DV-001440 - CAT II The applications must limit privileges to change the software
resident within software libraries.
0 0
APSC-DV-001460 - CAT II An application vulnerability assessment must be conducted. 0 0
APSC-DV-001480 - CAT II The application must prevent program execution in accordance
with organization-defined policies regarding software program usage and restrictions, and/or
rules authorizing the terms and conditions of software program usage.
0 0
APSC-DV-001490 - CAT II The application must employ a deny-all, permit-by-exception
(whitelist) policy to allow the execution of authorized software programs.
0 0
APSC-DV-001500 - CAT II The application must be configured to disable non-essential
capabilities.
0 0
PAGE 16 OF 47
APSC-DV-001510 - CAT II The application must be configured to use only functions, ports,
and protocols permitted to it in the PPSM CAL.
0 0
APSC-DV-001520 - CAT II The application must require users to reauthenticate when
organization-defined circumstances or situations require reauthentication.
0 0
APSC-DV-001530 - CAT II The application must require devices to reauthenticate when
organization-defined circumstances or situations requiring reauthentication.
0 0
APSC-DV-001540 - CAT I The application must uniquely identify and authenticate
organizational users (or processes acting on behalf of organizational users).
0 0
APSC-DV-001550 - CAT II The application must use multifactor (Alt. Token) authentication
for network access to privileged accounts.
0 0
APSC-DV-001560 - CAT II The application must accept Personal Identity Verification (PIV)
credentials.
0 0
APSC-DV-001580 - CAT II The application must use multifactor (e.g., CAC, Alt. Token)
authentication for network access to non-privileged accounts.
0 0
APSC-DV-001590 - CAT II The application must use multifactor (Alt. Token) authentication
for local access to privileged accounts.
0 0
APSC-DV-001600 - CAT II The application must use multifactor (e.g., CAC, Alt. Token)
authentication for local access to non-privileged accounts.
0 0
APSC-DV-001610 - CAT II The application must ensure users are authenticated with an
individual authenticator prior to using a group authenticator.
0 0
APSC-DV-001620 - CAT II The application must implement replay-resistant authentication
mechanisms for network access to privileged accounts.
0 0
APSC-DV-001630 - CAT II The application must implement replay-resistant authentication
mechanisms for network access to non-privileged accounts.
0 0
APSC-DV-001640 - CAT II The application must utilize mutual authentication when endpoint
device non-repudiation protections are required by DoD policy or by the data owner.
0 0
APSC-DV-001650 - CAT II The application must authenticate all network connected endpoint
devices before establishing any connection.
0 0
APSC-DV-001660 - CAT II Service-Oriented Applications handling non-releasable data must
authenticate endpoint devices via mutual SSL/TLS.
0 0
APSC-DV-001670 - CAT II The application must disable device identifiers after 35 days of
inactivity unless a cryptographic certificate is used for authentication.
0 0
APSC-DV-001680 - CAT I The application must enforce a minimum 15-character password
length.
0 0
APSC-DV-001690 - CAT II The application must enforce password complexity by requiring
that at least one upper-case character be used.
0 0
APSC-DV-001700 - CAT II The application must enforce password complexity by requiring
that at least one lower-case character be used.
0 0
APSC-DV-001710 - CAT II The application must enforce password complexity by requiring
that at least one numeric character be used.
0 0
APSC-DV-001720 - CAT II The application must enforce password complexity by requiring
that at least one special character be used.
0 0
APSC-DV-001730 - CAT II The application must require the change of at least 8 of the total
number of characters when passwords are changed.
0 0
APSC-DV-001740 - CAT I The application must only store cryptographic representations of
passwords.
0 0
APSC-DV-001850 - CAT I The application must not display passwords/PINs as clear text. 0 0
APSC-DV-001750 - CAT I The application must transmit only cryptographically-protected
passwords.
0 0
APSC-DV-001760 - CAT II The application must enforce 24 hours/1 day as the minimum
password lifetime.
0 0
APSC-DV-001770 - CAT II The application must enforce a 60-day maximum password
lifetime restriction.
0 0
APSC-DV-001780 - CAT II The application must prohibit password reuse for a minimum of
five generations.
0 0
PAGE 17 OF 47
APSC-DV-001790 - CAT II The application must allow the use of a temporary password for
system logons with an immediate change to a permanent password.
0 0
APSC-DV-001795 - CAT II The application password must not be changeable by users other
than the administrator or the user with which the password is associated.
0 0
APSC-DV-001800 - CAT II The application must terminate existing user sessions upon
account deletion.
0 0
APSC-DV-001820 - CAT I The application, when using PKI-based authentication, must
enforce authorized access to the corresponding private key.
0 0
APSC-DV-001830 - CAT II The application must map the authenticated identity to the
individual user or group account for PKI-based authentication.
0 0
APSC-DV-001870 - CAT II The application must uniquely identify and authenticate non-
organizational users (or processes acting on behalf of non-organizational users).
0 0
APSC-DV-001810 - CAT I The application, when utilizing PKI-based authentication, must
validate certificates by constructing a certification path (which includes status information)
to an accepted trust anchor.
0 0
APSC-DV-001840 - CAT II The application, for PKI-based authentication, must implement a
local cache of revocation data to support path discovery and validation in case of the
inability to access revocation information via the network.
0 0
APSC-DV-001860 - CAT II The application must use mechanisms meeting the requirements
of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and
guidance for authentication to a cryptographic module.
0 0
APSC-DV-001880 - CAT II The application must accept Personal Identity Verification (PIV)
credentials from other federal agencies.
0 0
APSC-DV-001890 - CAT II The application must electronically verify Personal Identity
Verification (PIV) credentials from other federal agencies.
0 0
APSC-DV-002050 - CAT II Applications making SAML assertions must use FIPS-approved
random numbers in the generation of SessionIndex in the SAML element AuthnStatement.
0 0
APSC-DV-001900 - CAT II The application must accept FICAM-approved third-party
credentials.
0 0
APSC-DV-001910 - CAT II The application must conform to FICAM-issued profiles. 0 0
APSC-DV-001930 - CAT II Applications used for non-local maintenance sessions must audit
non-local maintenance and diagnostic sessions for organization-defined auditable events.
0 0
APSC-DV-000310 - CAT III The application must have a process, feature or function that
prevents removal or disabling of emergency accounts.
0 0
APSC-DV-001940 - CAT II Applications used for non-local maintenance sessions must
implement cryptographic mechanisms to protect the integrity of non-local maintenance and
diagnostic communications.
0 0
APSC-DV-001950 - CAT II Applications used for non-local maintenance sessions must
implement cryptographic mechanisms to protect the confidentiality of non-local maintenance
and diagnostic communications.
0 0
APSC-DV-001960 - CAT II Applications used for non-local maintenance sessions must verify
remote disconnection at the termination of non-local maintenance and diagnostic sessions.
0 0
APSC-DV-001970 - CAT II The application must employ strong authenticators in the
establishment of non-local maintenance and diagnostic sessions.
0 0
APSC-DV-001980 - CAT II The application must terminate all sessions and network
connections when non-local maintenance is completed.
0 0
APSC-DV-001995 - CAT II The application must not be vulnerable to race conditions. 0 0
APSC-DV-002000 - CAT II The application must terminate all network connections
associated with a communications session at the end of the session.
0 0
APSC-DV-002010 - CAT II The application must implement NSA-approved cryptography to
protect classified information in accordance with applicable federal laws, Executive Orders,
directives, policies, regulations, and standards.
0 0
APSC-DV-002020 - CAT II The application must utilize FIPS-validated cryptographic modules
when signing application components.
0 0
APSC-DV-002030 - CAT II The application must utilize FIPS-validated cryptographic modules
when generating cryptographic hashes.
0 0
PAGE 18 OF 47
APSC-DV-002040 - CAT II The application must utilize FIPS-validated cryptographic modules
when protecting unclassified information that requires cryptographic protection.
0 0
APSC-DV-002150 - CAT II The application user interface must be either physically or
logically separated from data storage and management interfaces.
0 0
APSC-DV-002210 - CAT II The application must set the HTTPOnly flag on session cookies. 0 0
APSC-DV-002220 - CAT II The application must set the secure flag on session cookies. 0 0
APSC-DV-002230 - CAT I The application must not expose session IDs. 0 0
APSC-DV-002240 - CAT I The application must destroy the session ID value and/or cookie
on logoff or browser close.
0 0
APSC-DV-002250 - CAT II Applications must use system-generated session identifiers that
protect against session fixation.
0 0
APSC-DV-002260 - CAT II Applications must validate session identifiers. 0 0
APSC-DV-002270 - CAT II Applications must not use URL embedded session IDs. 0 0
APSC-DV-002280 - CAT II The application must not re-use or recycle session IDs. 0 0
APSC-DV-002290 - CAT II The application must use the Federal Information Processing
Standard (FIPS) 140-2-validated cryptographic modules and random number generator if
the application implements encryption, key exchange, digital signature, and hash
functionality.
0 0
APSC-DV-002300 - CAT II The application must only allow the use of DoD-approved
certificate authorities for verification of the establishment of protected sessions.
0 0
APSC-DV-002310 - CAT I The application must fail to a secure state if system initialization
fails, shutdown fails, or aborts fail.
0 0
APSC-DV-002320 - CAT II In the event of a system failure, applications must preserve any
information necessary to determine cause of failure and any information necessary to return
to operations with least disruption to mission processes.
0 0
APSC-DV-002330 - CAT II The application must protect the confidentiality and integrity of
stored information when required by DoD policy or the information owner.
0 0
APSC-DV-002340 - CAT II The application must implement approved cryptographic
mechanisms to prevent unauthorized modification of organization-defined information at
rest on organization-defined information system components.
0 0
APSC-DV-002350 - CAT II The application must use appropriate cryptography in order to
protect stored DoD information when required by the information owner or DoD policy.
0 0
APSC-DV-002360 - CAT II The application must isolate security functions from non-security
functions.
0 0
APSC-DV-002370 - CAT II The application must maintain a separate execution domain for
each executing process.
0 0
APSC-DV-002380 - CAT II Applications must prevent unauthorized and unintended
information transfer via shared system resources.
0 0
APSC-DV-002390 - CAT II XML-based applications must mitigate DoS attacks by using XML
filters, parser options, or gateways.
0 0
APSC-DV-002400 - CAT II The application must restrict the ability to launch Denial of
Service (DoS) attacks against itself or other information systems.
0 0
APSC-DV-002410 - CAT II The web service design must include redundancy mechanisms
when used with high-availability systems.
0 0
APSC-DV-002420 - CAT II An XML firewall function must be deployed to protect web
services when exposed to untrusted networks.
0 0
APSC-DV-002610 - CAT II The application must remove organization-defined software
components after updated versions have been installed.
0 0
APSC-DV-002440 - CAT I The application must protect the confidentiality and integrity of
transmitted information.
0 0
APSC-DV-002450 - CAT II The application must implement cryptographic mechanisms to
prevent unauthorized disclosure of information and/or detect changes to information during
transmission unless otherwise protected by alternative physical safeguards, such as, at a
minimum, a Prot
0 0
APSC-DV-002460 - CAT II The application must maintain the confidentiality and integrity of 0 0
PAGE 19 OF 47
information during preparation for transmission.
APSC-DV-002470 - CAT II The application must maintain the confidentiality and integrity of
information during reception.
0 0
APSC-DV-002480 - CAT II The application must not disclose unnecessary information to
users.
0 0
APSC-DV-002485 - CAT I The application must not store sensitive information in hidden
fields.
0 0
APSC-DV-002490 - CAT I The application must protect from Cross-Site Scripting (XSS)
vulnerabilities.
0 0
APSC-DV-002500 - CAT II The application must protect from Cross-Site Request Forgery
(CSRF) vulnerabilities.
0 0
APSC-DV-002510 - CAT I The application must protect from command injection. 0 0
APSC-DV-002520 - CAT II The application must protect from canonical representation
vulnerabilities.
0 0
APSC-DV-002530 - CAT II The application must validate all input. 0 0
APSC-DV-002540 - CAT I The application must not be vulnerable to SQL Injection. 0 0
APSC-DV-002550 - CAT I The application must not be vulnerable to XML-oriented attacks. 0 0
APSC-DV-002560 - CAT I The application must not be subject to input handling
vulnerabilities.
0 0
APSC-DV-002570 - CAT II The application must generate error messages that provide
information necessary for corrective actions without revealing information that could be
exploited by adversaries.
0 0
APSC-DV-002580 - CAT II The application must reveal error messages only to the ISSO,
ISSM, or SA.
0 0
APSC-DV-002590 - CAT I The application must not be vulnerable to overflow attacks. 0 0
APSC-DV-002630 - CAT II Security-relevant software updates and patches must be kept up
to date.
0 0
APSC-DV-002760 - CAT II The application performing organization-defined security
functions must verify correct operation of security functions.
0 0
APSC-DV-002900 - CAT II The ISSO must ensure application audit trails are retained for at
least 1 year for applications without SAMI data, and 5 years for applications including SAMI
data.
0 0
APSC-DV-002770 - CAT II The application must perform verification of the correct operation
of security functions: upon system startup and/or restart; upon command by a user with
privileged access; and/or every 30 days.
0 0
APSC-DV-002780 - CAT III The application must notify the ISSO and ISSM of failed security
verification tests.
0 0
APSC-DV-002870 - CAT II Unsigned Category 1A mobile code must not be used in the
application in accordance with DoD policy.
0 0
APSC-DV-002880 - CAT II The ISSO must ensure an account management process is
implemented, verifying only authorized users can gain access to the application, and
individual accounts designated as inactive, suspended, or terminated are promptly removed.
0 0
APSC-DV-002890 - CAT I Application web servers must be on a separate network segment
from the application and database servers if it is a tiered application operating in the DoD
DMZ.
0 0
APSC-DV-002910 - CAT II The ISSO must review audit trails periodically based on system
documentation recommendations or immediately upon system security events.
0 0
APSC-DV-002920 - CAT II The ISSO must report all suspected violations of IA policies in
accordance with DoD information system IA procedures.
0 0
APSC-DV-002930 - CAT II The ISSO must ensure active vulnerability testing is performed. 0 0
APSC-DV-002980 - CAT II New IP addresses, data services, and associated ports used by
the application must be submitted to the appropriate approving authority for the
organization, which in turn will be submitted through the DoD Ports, Protocols, and Services
Management (DoD PPS
0 0
APSC-DV-002950 - CAT II Execution flow diagrams and design documents must be created 0 0
PAGE 20 OF 47
to show how deadlock and recursion issues in web services are being mitigated.
APSC-DV-002960 - CAT II The designer must ensure the application does not store
configuration and control files in the same directory as user data.
0 0
APSC-DV-002970 - CAT II The ISSO must ensure if a DoD STIG or NSA guide is not
available, a third-party product will be configured by following available guidance.
0 0
APSC-DV-002990 - CAT II The application must be registered with the DoD Ports and
Protocols Database.
0 0
APSC-DV-002990 - CAT II The application must be registered with the DoD Ports and
Protocols Database.
0 0
APSC-DV-002995 - CAT II The Configuration Management (CM) repository must be properly
patched and STIG compliant.
0 0
APSC-DV-003000 - CAT II Access privileges to the Configuration Management (CM)
repository must be reviewed every three months.
0 0
APSC-DV-003010 - CAT II A Software Configuration Management (SCM) plan describing the
configuration control and change management process of application objects developed by
the organization and the roles and responsibilities of the organization must be created and
maintained.
0 0
APSC-DV-003020 - CAT II A Configuration Control Board (CCB) that meets at least every
release cycle, for managing the Configuration Management (CM) process must be
established.
0 0
APSC-DV-003030 - CAT II The application services and interfaces must be compatible with
and ready for IPv6 networks.
0 0
APSC-DV-003040 - CAT II The application must not be hosted on a general purpose
machine if the application is designated as critical or high availability by the ISSO.
0 0
APSC-DV-003050 - CAT II A disaster recovery/continuity plan must exist in accordance with
DoD policy based on the applications availability requirements.
0 0
APSC-DV-003060 - CAT II Recovery procedures and technical system features must exist so
recovery is performed in a secure and verifiable manner. The ISSO will document
circumstances inhibiting a trusted recovery.
0 0
APSC-DV-003070 - CAT II Data backup must be performed at required intervals in
accordance with DoD policy.
0 0
APSC-DV-003080 - CAT II Back-up copies of the application software or source code must
be stored in a fire-rated container or stored separately (offsite).
0 0
APSC-DV-003090 - CAT II Procedures must be in place to assure the appropriate physical
and technical protection of the backup and restoration of the application.
0 0
APSC-DV-003100 - CAT II The application must use encryption to implement key exchange
and authenticate endpoints prior to establishing a communication channel for key exchange.
0 0
APSC-DV-003110 - CAT I The application must not contain embedded authentication data. 0 0
APSC-DV-003120 - CAT I The application must have the capability to mark
sensitive/classified output when required.
0 0
APSC-DV-003130 - CAT III Prior to each release of the application, updates to system, or
applying patches; tests plans and procedures must be created and executed.
0 0
APSC-DV-003150 - CAT II At least one tester must be designated to test for security flaws
in addition to functional testing.
0 0
APSC-DV-003140 - CAT II Application files must be cryptographically hashed prior to
deploying to DoD operational networks.
0 0
APSC-DV-003160 - CAT III Test procedures must be created and at least annually executed
to ensure system initialization, shutdown, and aborts are configured to verify the system
remains in a secure state.
0 0
APSC-DV-003170 - CAT II An application code review must be performed on the application. 0 0
APSC-DV-003180 - CAT III Code coverage statistics must be maintained for each release of
the application.
0 0
APSC-DV-003190 - CAT II Flaws found during a code review must be tracked in a defect
tracking system.
0 0
APSC-DV-003200 - CAT II The changes to the application must be assessed for IA and 0 0
PAGE 21 OF 47
accreditation impact prior to implementation.
APSC-DV-003210 - CAT II Security flaws must be fixed or addressed in the project plan. 0 0
APSC-DV-003215 - CAT III The application development team must follow a set of coding
standards.
0 0
APSC-DV-003220 - CAT III The designer must create and update the Design Document for
each release of the application.
0 0
APSC-DV-003230 - CAT II Threat models must be documented and reviewed for each
application release and updated as required by design and functionality changes or when
new threats are discovered.
0 0
APSC-DV-003235 - CAT II The application must not be subject to error handling
vulnerabilities.
0 0
APSC-DV-003250 - CAT I The application must be decommissioned when maintenance or
support is no longer available.
0 0
APSC-DV-003236 - CAT II The application development team must provide an application
incident response plan.
0 0
APSC-DV-003240 - CAT I All products must be supported by the vendor or the development
team.
0 0
APSC-DV-003260 - CAT III Procedures must be in place to notify users when an application
is decommissioned.
0 0
APSC-DV-003270 - CAT II Unnecessary built-in application accounts must be disabled. 0 0
APSC-DV-003280 - CAT I Default passwords must be changed. 0 0
APSC-DV-003330 - CAT II The system must alert an administrator when low resource
conditions are encountered.
0 0
APSC-DV-003285 - CAT II An Application Configuration Guide must be created and included
with the application.
0 0
APSC-DV-003290 - CAT II If the application contains classified data, a Security Classification
Guide must exist containing data elements and their classification.
0 0
APSC-DV-003300 - CAT II The designer must ensure uncategorized or emerging mobile
code is not used in applications.
0 0
APSC-DV-003310 - CAT II Production database exports must have database administration
credentials and sensitive data removed before releasing the export.
0 0
APSC-DV-003320 - CAT II Protections against DoS attacks must be implemented. 0 0
APSC-DV-003340 - CAT III At least one application administrator must be registered to
receive update notifications, or security alerts, when automated alerts are available.
0 0
APSC-DV-003360 - CAT III The application must generate audit records when concurrent
logons from different workstations occur.
0 0
APSC-DV-003345 - CAT III The application must provide notifications or alerts when product
update and security related patches are available.
0 0
APSC-DV-003350 - CAT II Connections between the DoD enclave and the Internet or other
public or commercial wide area networks must require a DMZ.
0 0
APSC-DV-003400 - CAT II The Program Manager must verify all levels of program
management, designers, developers, and testers receive annual security training pertaining
to their job function.
0 0
APSC-DV-000010 - CAT II The application must provide a capability to limit the number of
logon sessions per user.
0 0
APSC-DV-000060 - CAT II The application must clear temporary storage and cookies when
the session is terminated.
0 0
APSC-DV-000070 - CAT II The application must automatically terminate the non-privileged
user session and log off non-privileged users after a 15 minute idle time period has elapsed.
0 0
APSC-DV-000080 - CAT II The application must automatically terminate the admin user
session and log off admin users after a 10 minute idle time period is exceeded.
0 0
APSC-DV-000090 - CAT II Applications requiring user access authentication must provide a
logoff capability for user initiated communication session.
0 0
APSC-DV-000100 - CAT III The application must display an explicit logoff message to users 0 0
PAGE 22 OF 47
indicating the reliable termination of authenticated communications sessions.
APSC-DV-000110 - CAT II The application must associate organization-defined types of
security attributes having organization-defined security attribute values with information in
storage.
0 0
APSC-DV-000120 - CAT II The application must associate organization-defined types of
security attributes having organization-defined security attribute values with information in
process.
0 0
APSC-DV-000130 - CAT II The application must associate organization-defined types of
security attributes having organization-defined security attribute values with information in
transmission.
0 0
APSC-DV-000160 - CAT II The application must implement DoD-approved encryption to
protect the confidentiality of remote access sessions.
0 0
APSC-DV-000170 - CAT II The application must implement cryptographic mechanisms to
protect the integrity of remote access sessions.
0 0
APSC-DV-000190 - CAT I Messages protected with WS_Security must use time stamps with
creation and expiration times.
0 0
APSC-DV-000180 - CAT II Applications with SOAP messages requiring integrity must include
the following message elements:-Message ID-Service Request-Timestamp-SAML Assertion
(optionally included in messages) and all elements of the message must be digitally signed.
0 0
APSC-DV-000200 - CAT I Validity periods must be verified on all application messages using
WS-Security or SAML assertions.
0 0
APSC-DV-000210 - CAT II The application must ensure each unique asserting party provides
unique assertion ID references for each SAML assertion.
0 0
APSC-DV-000220 - CAT II The application must ensure encrypted assertions, or equivalent
confidentiality protections are used when assertion data is passed through an intermediary,
and confidentiality of the assertion data is required when passing through the intermediary.
0 0
APSC-DV-000230 - CAT I The application must use the NotOnOrAfter condition when using
the SubjectConfirmation element in a SAML assertion.
0 0
APSC-DV-000240 - CAT I The application must use both the NotBefore and NotOnOrAfter
elements or OneTimeUse element when using the Conditions element in a SAML assertion.
0 0
APSC-DV-000250 - CAT II The application must ensure if a OneTimeUse element is used in
an assertion, there is only one of the same used in the Conditions element portion of an
assertion.
0 0
APSC-DV-000260 - CAT II The application must ensure messages are encrypted when the
SessionIndex is tied to privacy data.
0 0
APSC-DV-000290 - CAT II Shared/group account credentials must be terminated when
members leave the group.
0 0
APSC-DV-000280 - CAT II The application must provide automated mechanisms for
supporting account management functions.
0 0
APSC-DV-000300 - CAT II The application must automatically remove or disable temporary
user accounts 72 hours after account creation.
0 0
APSC-DV-000320 - CAT III The application must automatically disable accounts after a 35
day period of account inactivity.
0 0
APSC-DV-000330 - CAT II Unnecessary application accounts must be disabled, or deleted. 0 0
APSC-DV-000420 - CAT II The application must automatically audit account enabling
actions.
0 0
APSC-DV-000340 - CAT II The application must automatically audit account creation. 0 0
APSC-DV-000350 - CAT II The application must automatically audit account modification. 0 0
APSC-DV-000360 - CAT II The application must automatically audit account disabling
actions.
0 0
APSC-DV-000370 - CAT II The application must automatically audit account removal
actions.
0 0
APSC-DV-000380 - CAT III The application must notify System Administrators and
Information System Security Officers when accounts are created.
0 0
APSC-DV-000390 - CAT III The application must notify System Administrators and 0 0
PAGE 23 OF 47
Information System Security Officers when accounts are modified.
APSC-DV-000400 - CAT III The application must notify System Administrators and
Information System Security Officers of account disabling actions.
0 0
APSC-DV-000410 - CAT III The application must notify System Administrators and
Information System Security Officers of account removal actions.
0 0
APSC-DV-000430 - CAT III The application must notify System Administrators and
Information System Security Officers of account enabling actions.
0 0
APSC-DV-000440 - CAT II Application data protection requirements must be identified and
documented.
0 0
APSC-DV-000520 - CAT II The application must audit the execution of privileged functions. 0 0
APSC-DV-000450 - CAT II The application must utilize organization-defined data mining
detection techniques for organization-defined data storage objects to adequately detect data
mining attempts.
0 0
APSC-DV-000460 - CAT I The application must enforce approved authorizations for logical
access to information and system resources in accordance with applicable access control
policies.
0 0
APSC-DV-000470 - CAT II The application must enforce organization-defined discretionary
access control policies over defined subjects and objects.
0 0
APSC-DV-000480 - CAT II The application must enforce approved authorizations for
controlling the flow of information within the system based on organization-defined
information flow control policies.
0 0
APSC-DV-000490 - CAT II The application must enforce approved authorizations for
controlling the flow of information between interconnected systems based on organization-
defined information flow control policies.
0 0
APSC-DV-000500 - CAT II The application must prevent non-privileged users from executing
privileged functions to include disabling, circumventing, or altering implemented security
safeguards/countermeasures.
0 0
APSC-DV-000510 - CAT I The application must execute without excessive account
permissions.
0 0
APSC-DV-000530 - CAT I The application must enforce the limit of three consecutive invalid
logon attempts by a user during a 15 minute time period.
0 0
APSC-DV-000560 - CAT III The application must retain the Standard Mandatory DoD Notice
and Consent Banner on the screen until users acknowledge the usage conditions and take
explicit actions to log on for further access.
0 0
APSC-DV-000540 - CAT II The application administrator must follow an approved process to
unlock locked user accounts.
0 0
APSC-DV-000550 - CAT III The application must display the Standard Mandatory DoD
Notice and Consent Banner before granting access to the application.
0 0
APSC-DV-000570 - CAT III The publicly accessible application must display the Standard
Mandatory DoD Notice and Consent Banner before granting access to the application.
0 0
APSC-DV-000580 - CAT III The application must display the time and date of the users last
successful logon.
0 0
APSC-DV-000630 - CAT II The application must provide audit record generation capability
for the destruction of session IDs.
0 0
APSC-DV-000590 - CAT II The application must protect against an individual (or process
acting on behalf of an individual) falsely denying having performed organization-defined
actions to be covered by non-repudiation.
0 0
APSC-DV-000600 - CAT II For applications providing audit record aggregation, the
application must compile audit records from organization-defined information system
components into a system-wide audit trail that is time-correlated with an organization-
defined level of tolerance
0 0
APSC-DV-000610 - CAT II The application must provide the capability for organization-
identified individuals or roles to change the auditing to be performed on all application
components, based on all selectable event criteria within organization-defined time
thresholds.
0 0
APSC-DV-000620 - CAT II The application must provide audit record generation capability
for the creation of session IDs.
0 0
PAGE 24 OF 47
Scan Summary - ASD STIG 5.2
Category
Issues
Found
Best Fix
Locations
APSC-DV-000640 - CAT II The application must provide audit record generation capability
for the renewal of session IDs.
0 0
APSC-DV-000650 - CAT II The application must not write sensitive data into the application
logs.
0 0
APSC-DV-000660 - CAT II The application must provide audit record generation capability
for session timeouts.
0 0
APSC-DV-000670 - CAT II The application must record a time stamp indicating when the
event occurred.
0 0
APSC-DV-000680 - CAT II The application must provide audit record generation capability
for HTTP headers including User-Agent, Referer, GET, and POST.
0 0
APSC-DV-000690 - CAT II The application must provide audit record generation capability
for connecting system IP addresses.
0 0
APSC-DV-000700 - CAT II The application must record the username or user ID of the user
associated with the event.
0 0
APSC-DV-000710 - CAT II The application must generate audit records when
successful/unsuccessful attempts to grant privileges occur.
0 0
APSC-DV-000720 - CAT II The application must generate audit records when
successful/unsuccessful attempts to access security objects occur.
0 0
APSC-DV-000730 - CAT II The application must generate audit records when
successful/unsuccessful attempts to access security levels occur.
0 0
APSC-DV-000740 - CAT II The application must generate audit records when
successful/unsuccessful attempts to access categories of information (e.g., classification
levels) occur.
0 0
APSC-DV-000750 - CAT II The application must generate audit records when
successful/unsuccessful attempts to modify privileges occur.
0 0
APSC-DV-000760 - CAT II The application must generate audit records when
successful/unsuccessful attempts to modify security objects occur.
0 0
APSC-DV-000770 - CAT II The application must generate audit records when
successful/unsuccessful attempts to modify security levels occur.
0 0
APSC-DV-000780 - CAT II The application must generate audit records when
successful/unsuccessful attempts to modify categories of information (e.g., classification
levels) occur.
0 0
APSC-DV-000790 - CAT II The application must generate audit records when
successful/unsuccessful attempts to delete privileges occur.
0 0
APSC-DV-000800 - CAT II The application must generate audit records when
successful/unsuccessful attempts to delete security levels occur.
0 0
APSC-DV-000810 - CAT II The application must generate audit records when
successful/unsuccessful attempts to delete application database security objects occur.
0 0
APSC-DV-000820 - CAT II The application must generate audit records when
successful/unsuccessful attempts to delete categories of information (e.g., classification
levels) occur.
0 0
APSC-DV-000830 - CAT II The application must generate audit records when
successful/unsuccessful logon attempts occur.
0 0
APSC-DV-000840 - CAT II The application must generate audit records for privileged
activities or other system-level access.
0 0
APSC-DV-000850 - CAT II The application must generate audit records showing starting and
ending time for user access to the system.
0 0
APSC-DV-000860 - CAT II The application must generate audit records when
successful/unsuccessful accesses to objects occur.
0 0
PAGE 25 OF 47
APSC-DV-000870 - CAT II The application must generate audit records for all direct access
to the information system.
0 0
APSC-DV-000880 - CAT II The application must generate audit records for all account
creations, modifications, disabling, and termination events.
0 0
APSC-DV-000910 - CAT II The application must initiate session auditing upon startup. 0 0
APSC-DV-000940 - CAT II The application must log application shutdown events. 0 0
APSC-DV-000950 - CAT II The application must log destination IP addresses. 0 0
APSC-DV-000960 - CAT II The application must log user actions involving access to data. 0 0
APSC-DV-000970 - CAT II The application must log user actions involving changes to data. 0 0
APSC-DV-000980 - CAT II The application must produce audit records containing
information to establish when (date and time) the events occurred.
0 0
APSC-DV-000990 - CAT II The application must produce audit records containing enough
information to establish which component, feature or function of the application triggered
the audit event.
0 0
APSC-DV-001000 - CAT II When using centralized logging; the application must include a
unique identifier in order to distinguish itself from other application logs.
0 0
APSC-DV-001010 - CAT II The application must produce audit records that contain
information to establish the outcome of the events.
0 0
APSC-DV-001020 - CAT II The application must generate audit records containing
information that establishes the identity of any individual or process associated with the
event.
0 0
APSC-DV-001030 - CAT II The application must generate audit records containing the full-
text recording of privileged commands or the individual identities of group account users.
0 0
APSC-DV-001040 - CAT II The application must implement transaction recovery logs when
transaction based.
0 0
APSC-DV-001050 - CAT II The application must provide centralized management and
configuration of the content to be captured in audit records generated by all application
components.
0 0
APSC-DV-001070 - CAT II The application must off-load audit records onto a different
system or media than the system being audited.
0 0
APSC-DV-001080 - CAT II The application must be configured to write application logs to a
centralized log repository.
0 0
APSC-DV-001090 - CAT II The application must provide an immediate warning to the SA
and ISSO (at a minimum) when allocated audit record storage volume reaches 75% of
repository maximum audit record storage capacity.
0 0
APSC-DV-001100 - CAT II Applications categorized as having a moderate or high impact
must provide an immediate real-time alert to the SA and ISSO (at a minimum) for all audit
failure events.
0 0
APSC-DV-001110 - CAT II The application must alert the ISSO and SA (at a minimum) in
the event of an audit processing failure.
0 0
APSC-DV-001120 - CAT II The application must shut down by default upon audit failure
(unless availability is an overriding concern).
0 0
APSC-DV-001130 - CAT II The application must provide the capability to centrally review
and analyze audit records from multiple components within the system.
0 0
APSC-DV-001140 - CAT II The application must provide the capability to filter audit records
for events of interest based upon organization-defined criteria.
0 0
APSC-DV-001150 - CAT II The application must provide an audit reduction capability that
supports on-demand reporting requirements.
0 0
APSC-DV-001160 - CAT II The application must provide an audit reduction capability that
supports on-demand audit review and analysis.
0 0
APSC-DV-001170 - CAT II The application must provide an audit reduction capability that
supports after-the-fact investigations of security incidents.
0 0
APSC-DV-001180 - CAT II The application must provide a report generation capability that
supports on-demand audit review and analysis.
0 0
APSC-DV-001190 - CAT II The application must provide a report generation capability that 0 0
PAGE 26 OF 47
supports on-demand reporting requirements.
APSC-DV-001200 - CAT II The application must provide a report generation capability that
supports after-the-fact investigations of security incidents.
0 0
APSC-DV-001210 - CAT II The application must provide an audit reduction capability that
does not alter original content or time ordering of audit records.
0 0
APSC-DV-001220 - CAT II The application must provide a report generation capability that
does not alter original content or time ordering of audit records.
0 0
APSC-DV-001250 - CAT II The applications must use internal system clocks to generate
time stamps for audit records.
0 0
APSC-DV-001260 - CAT II The application must record time stamps for audit records that
can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
0 0
APSC-DV-001270 - CAT II The application must record time stamps for audit records that
meet a granularity of one second for a minimum degree of precision.
0 0
APSC-DV-001280 - CAT II The application must protect audit information from any type of
unauthorized read access.
0 0
APSC-DV-001290 - CAT II The application must protect audit information from unauthorized
modification.
0 0
APSC-DV-001300 - CAT II The application must protect audit information from unauthorized
deletion.
0 0
APSC-DV-001310 - CAT II The application must protect audit tools from unauthorized
access.
0 0
APSC-DV-001320 - CAT II The application must protect audit tools from unauthorized
modification.
0 0
APSC-DV-001330 - CAT II The application must protect audit tools from unauthorized
deletion.
0 0
APSC-DV-001340 - CAT II The application must back up audit records at least every seven
days onto a different system or system component than the system or component being
audited.
0 0
APSC-DV-001570 - CAT II The application must electronically verify Personal Identity
Verification (PIV) credentials.
0 0
APSC-DV-001350 - CAT II The application must use cryptographic mechanisms to protect
the integrity of audit information.
0 0
APSC-DV-001360 - CAT II Application audit tools must be cryptographically hashed. 0 0
APSC-DV-001370 - CAT II The integrity of the audit tools must be validated by checking the
files for changes in the cryptographic hash value.
0 0
APSC-DV-001390 - CAT II The application must prohibit user installation of software without
explicit privileged status.
0 0
APSC-DV-001410 - CAT II The application must enforce access restrictions associated with
changes to application configuration.
0 0
APSC-DV-001420 - CAT II The application must audit who makes configuration changes to
the application.
0 0
APSC-DV-001430 - CAT II The application must have the capability to prevent the
installation of patches, service packs, or application components without verification the
software component has been digitally signed using a certificate that is recognized and
approved by the orga
0 0
APSC-DV-001440 - CAT II The applications must limit privileges to change the software
resident within software libraries.
0 0
APSC-DV-001460 - CAT II An application vulnerability assessment must be conducted. 0 0
APSC-DV-001480 - CAT II The application must prevent program execution in accordance
with organization-defined policies regarding software program usage and restrictions, and/or
rules authorizing the terms and conditions of software program usage.
0 0
APSC-DV-001490 - CAT II The application must employ a deny-all, permit-by-exception
(whitelist) policy to allow the execution of authorized software programs.
0 0
APSC-DV-001500 - CAT II The application must be configured to disable non-essential
capabilities.
0 0
PAGE 27 OF 47
APSC-DV-001510 - CAT II The application must be configured to use only functions, ports,
and protocols permitted to it in the PPSM CAL.
0 0
APSC-DV-001520 - CAT II The application must require users to reauthenticate when
organization-defined circumstances or situations require reauthentication.
0 0
APSC-DV-001530 - CAT II The application must require devices to reauthenticate when
organization-defined circumstances or situations requiring reauthentication.
0 0
APSC-DV-001540 - CAT I The application must uniquely identify and authenticate
organizational users (or processes acting on behalf of organizational users).
0 0
APSC-DV-001550 - CAT II The application must use multifactor (Alt. Token) authentication
for network access to privileged accounts.
0 0
APSC-DV-001560 - CAT II The application must accept Personal Identity Verification (PIV)
credentials.
0 0
APSC-DV-001580 - CAT II The application must use multifactor (e.g., CAC, Alt. Token)
authentication for network access to non-privileged accounts.
0 0
APSC-DV-001590 - CAT II The application must use multifactor (Alt. Token) authentication
for local access to privileged accounts.
0 0
APSC-DV-001600 - CAT II The application must use multifactor (e.g., CAC, Alt. Token)
authentication for local access to non-privileged accounts.
0 0
APSC-DV-001610 - CAT II The application must ensure users are authenticated with an
individual authenticator prior to using a group authenticator.
0 0
APSC-DV-001620 - CAT II The application must implement replay-resistant authentication
mechanisms for network access to privileged accounts.
6 6
APSC-DV-001630 - CAT II The application must implement replay-resistant authentication
mechanisms for network access to non-privileged accounts.
0 0
APSC-DV-001640 - CAT II The application must utilize mutual authentication when endpoint
device non-repudiation protections are required by DoD policy or by the data owner.
0 0
APSC-DV-001650 - CAT II The application must authenticate all network connected endpoint
devices before establishing any connection.
0 0
APSC-DV-001660 - CAT II Service-Oriented Applications handling non-releasable data must
authenticate endpoint devices via mutual SSL/TLS.
0 0
APSC-DV-001670 - CAT II The application must disable device identifiers after 35 days of
inactivity unless a cryptographic certificate is used for authentication.
0 0
APSC-DV-001680 - CAT I The application must enforce a minimum 15-character password
length.*
0 0
APSC-DV-001690 - CAT II The application must enforce password complexity by requiring
that at least one upper-case character be used.
0 0
APSC-DV-001700 - CAT II The application must enforce password complexity by requiring
that at least one lower-case character be used.
0 0
APSC-DV-001710 - CAT II The application must enforce password complexity by requiring
that at least one numeric character be used.
0 0
APSC-DV-001720 - CAT II The application must enforce password complexity by requiring
that at least one special character be used.
0 0
APSC-DV-001730 - CAT II The application must require the change of at least 8 of the total
number of characters when passwords are changed.
0 0
APSC-DV-001740 - CAT I The application must only store cryptographic representations of
passwords.*
27 27
APSC-DV-001850 - CAT I The application must not display passwords/PINs as clear text. 0 0
APSC-DV-001750 - CAT I The application must transmit only cryptographically-protected
passwords.
0 0
APSC-DV-001760 - CAT II The application must enforce 24 hours/1 day as the minimum
password lifetime.
0 0
APSC-DV-001770 - CAT II The application must enforce a 60-day maximum password
lifetime restriction.
0 0
APSC-DV-001780 - CAT II The application must prohibit password reuse for a minimum of
five generations.
0 0
PAGE 28 OF 47
APSC-DV-001790 - CAT II The application must allow the use of a temporary password for
system logons with an immediate change to a permanent password.
0 0
APSC-DV-001795 - CAT II The application password must not be changeable by users other
than the administrator or the user with which the password is associated.
0 0
APSC-DV-001800 - CAT II The application must terminate existing user sessions upon
account deletion.
0 0
APSC-DV-001820 - CAT I The application, when using PKI-based authentication, must
enforce authorized access to the corresponding private key.
0 0
APSC-DV-001830 - CAT II The application must map the authenticated identity to the
individual user or group account for PKI-based authentication.
0 0
APSC-DV-001870 - CAT II The application must uniquely identify and authenticate non-
organizational users (or processes acting on behalf of non-organizational users).
0 0
APSC-DV-001810 - CAT I The application, when utilizing PKI-based authentication, must
validate certificates by constructing a certification path (which includes status information)
to an accepted trust anchor.
0 0
APSC-DV-001840 - CAT II The application, for PKI-based authentication, must implement a
local cache of revocation data to support path discovery and validation in case of the
inability to access revocation information via the network.
0 0
APSC-DV-001860 - CAT II The application must use mechanisms meeting the requirements
of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and
guidance for authentication to a cryptographic module.
0 0
APSC-DV-001880 - CAT II The application must accept Personal Identity Verification (PIV)
credentials from other federal agencies.
0 0
APSC-DV-001890 - CAT II The application must electronically verify Personal Identity
Verification (PIV) credentials from other federal agencies.
0 0
APSC-DV-002050 - CAT II Applications making SAML assertions must use FIPS-approved
random numbers in the generation of SessionIndex in the SAML element AuthnStatement.
0 0
APSC-DV-001900 - CAT II The application must accept FICAM-approved third-party
credentials.
0 0
APSC-DV-001910 - CAT II The application must conform to FICAM-issued profiles. 0 0
APSC-DV-001930 - CAT II Applications used for non-local maintenance sessions must audit
non-local maintenance and diagnostic sessions for organization-defined auditable events.
0 0
APSC-DV-000310 - CAT III The application must have a process, feature or function that
prevents removal or disabling of emergency accounts.
0 0
APSC-DV-001940 - CAT II Applications used for non-local maintenance sessions must
implement cryptographic mechanisms to protect the integrity of non-local maintenance and
diagnostic communications.
0 0
APSC-DV-001950 - CAT II Applications used for non-local maintenance sessions must
implement cryptographic mechanisms to protect the confidentiality of non-local maintenance
and diagnostic communications.
0 0
APSC-DV-001960 - CAT II Applications used for non-local maintenance sessions must verify
remote disconnection at the termination of non-local maintenance and diagnostic sessions.
0 0
APSC-DV-001970 - CAT II The application must employ strong authenticators in the
establishment of non-local maintenance and diagnostic sessions.
0 0
APSC-DV-001980 - CAT II The application must terminate all sessions and network
connections when non-local maintenance is completed.
0 0
APSC-DV-001995 - CAT II The application must not be vulnerable to race conditions. 0 0
APSC-DV-002000 - CAT II The application must terminate all network connections
associated with a communications session at the end of the session.
0 0
APSC-DV-002010 - CAT II The application must implement NSA-approved cryptography to
protect classified information in accordance with applicable federal laws, Executive Orders,
directives, policies, regulations, and standards.
0 0
APSC-DV-002020 - CAT II The application must utilize FIPS-validated cryptographic modules
when signing application components.
0 0
APSC-DV-002030 - CAT II The application must utilize FIPS-validated cryptographic modules
when generating cryptographic hashes.
0 0
PAGE 29 OF 47
APSC-DV-002040 - CAT II The application must utilize FIPS-validated cryptographic modules
when protecting unclassified information that requires cryptographic protection.
0 0
APSC-DV-002150 - CAT II The application user interface must be either physically or
logically separated from data storage and management interfaces.
0 0
APSC-DV-002210 - CAT II The application must set the HTTPOnly flag on session cookies. 20 20
APSC-DV-002220 - CAT II The application must set the secure flag on session cookies. 0 0
APSC-DV-002230 - CAT I The application must not expose session IDs.* 0 0
APSC-DV-002240 - CAT I The application must destroy the session ID value and/or cookie
on logoff or browser close.
0 0
APSC-DV-002250 - CAT II Applications must use system-generated session identifiers that
protect against session fixation.
0 0
APSC-DV-002260 - CAT II Applications must validate session identifiers. 0 0
APSC-DV-002270 - CAT II Applications must not use URL embedded session IDs. 0 0
APSC-DV-002280 - CAT II The application must not re-use or recycle session IDs. 0 0
APSC-DV-002290 - CAT II The application must use the Federal Information Processing
Standard (FIPS) 140-2-validated cryptographic modules and random number generator if
the application implements encryption, key exchange, digital signature, and hash
functionality.*
0 0
APSC-DV-002300 - CAT II The application must only allow the use of DoD-approved
certificate authorities for verification of the establishment of protected sessions.
1 1
APSC-DV-002310 - CAT I The application must fail to a secure state if system initialization
fails, shutdown fails, or aborts fail.
0 0
APSC-DV-002320 - CAT II In the event of a system failure, applications must preserve any
information necessary to determine cause of failure and any information necessary to return
to operations with least disruption to mission processes.
0 0
APSC-DV-002330 - CAT II The application must protect the confidentiality and integrity of
stored information when required by DoD policy or the information owner.
120 27
APSC-DV-002340 - CAT II The application must implement approved cryptographic
mechanisms to prevent unauthorized modification of organization-defined information at
rest on organization-defined information system components.
0 0
APSC-DV-002350 - CAT II The application must use appropriate cryptography in order to
protect stored DoD information when required by the information owner or DoD policy.
0 0
APSC-DV-002360 - CAT II The application must isolate security functions from non-security
functions.
0 0
APSC-DV-002370 - CAT II The application must maintain a separate execution domain for
each executing process.
0 0
APSC-DV-002380 - CAT II Applications must prevent unauthorized and unintended
information transfer via shared system resources.
0 0
APSC-DV-002390 - CAT II XML-based applications must mitigate DoS attacks by using XML
filters, parser options, or gateways.
0 0
APSC-DV-002400 - CAT II The application must restrict the ability to launch Denial of
Service (DoS) attacks against itself or other information systems.*
11 11
APSC-DV-002410 - CAT II The web service design must include redundancy mechanisms
when used with high-availability systems.
0 0
APSC-DV-002420 - CAT II An XML firewall function must be deployed to protect web
services when exposed to untrusted networks.
0 0
APSC-DV-002610 - CAT II The application must remove organization-defined software
components after updated versions have been installed.
1 1
APSC-DV-002440 - CAT I The application must protect the confidentiality and integrity of
transmitted information.
0 0
APSC-DV-002450 - CAT II The application must implement cryptographic mechanisms to
prevent unauthorized disclosure of information and/or detect changes to information during
transmission unless otherwise protected by alternative physical safeguards, such as, at a
minimum, a Prot
0 0
APSC-DV-002460 - CAT II The application must maintain the confidentiality and integrity of 3 3
PAGE 30 OF 47
information during preparation for transmission.
APSC-DV-002470 - CAT II The application must maintain the confidentiality and integrity of
information during reception.
0 0
APSC-DV-002480 - CAT II The application must not disclose unnecessary information to
users.
0 0
APSC-DV-002485 - CAT I The application must not store sensitive information in hidden
fields.
0 0
APSC-DV-002490 - CAT I The application must protect from Cross-Site Scripting (XSS)
vulnerabilities.*
122 50
APSC-DV-002500 - CAT II The application must protect from Cross-Site Request Forgery
(CSRF) vulnerabilities.*
109 109
APSC-DV-002510 - CAT I The application must protect from command injection. 0 0
APSC-DV-002520 - CAT II The application must protect from canonical representation
vulnerabilities.
0 0
APSC-DV-002530 - CAT II The application must validate all input.* 9 9
APSC-DV-002540 - CAT I The application must not be vulnerable to SQL Injection.* 0 0
APSC-DV-002550 - CAT I The application must not be vulnerable to XML-oriented attacks. 0 0
APSC-DV-002560 - CAT I The application must not be subject to input handling
vulnerabilities.*
2210 238
APSC-DV-002570 - CAT II The application must generate error messages that provide
information necessary for corrective actions without revealing information that could be
exploited by adversaries.
194 194
APSC-DV-002580 - CAT II The application must reveal error messages only to the ISSO,
ISSM, or SA.*
0 0
APSC-DV-002590 - CAT I The application must not be vulnerable to overflow attacks. 0 0
APSC-DV-002630 - CAT II Security-relevant software updates and patches must be kept up
to date.
0 0
APSC-DV-002760 - CAT II The application performing organization-defined security
functions must verify correct operation of security functions.
0 0
APSC-DV-002900 - CAT II The ISSO must ensure application audit trails are retained for at
least 1 year for applications without SAMI data, and 5 years for applications including SAMI
data.
0 0
APSC-DV-002770 - CAT II The application must perform verification of the correct operation
of security functions: upon system startup and/or restart; upon command by a user with
privileged access; and/or every 30 days.
0 0
APSC-DV-002780 - CAT III The application must notify the ISSO and ISSM of failed security
verification tests.
0 0
APSC-DV-002870 - CAT II Unsigned Category 1A mobile code must not be used in the
application in accordance with DoD policy.
0 0
APSC-DV-002880 - CAT II The ISSO must ensure an account management process is
implemented, verifying only authorized users can gain access to the application, and
individual accounts designated as inactive, suspended, or terminated are promptly removed.
0 0
APSC-DV-002890 - CAT I Application web servers must be on a separate network segment
from the application and database servers if it is a tiered application operating in the DoD
DMZ.
0 0
APSC-DV-002910 - CAT II The ISSO must review audit trails periodically based on system
documentation recommendations or immediately upon system security events.
0 0
APSC-DV-002920 - CAT II The ISSO must report all suspected violations of IA policies in
accordance with DoD information system IA procedures.
0 0
APSC-DV-002930 - CAT II The ISSO must ensure active vulnerability testing is performed. 0 0
APSC-DV-002980 - CAT II New IP addresses, data services, and associated ports used by
the application must be submitted to the appropriate approving authority for the
organization, which in turn will be submitted through the DoD Ports, Protocols, and Services
Management (DoD PPS
0 0
APSC-DV-002950 - CAT II Execution flow diagrams and design documents must be created 0 0
PAGE 31 OF 47
to show how deadlock and recursion issues in web services are being mitigated.
APSC-DV-002960 - CAT II The designer must ensure the application does not store
configuration and control files in the same directory as user data.
0 0
APSC-DV-002970 - CAT II The ISSO must ensure if a DoD STIG or NSA guide is not
available, a third-party product will be configured by following available guidance.
0 0
APSC-DV-002990 - CAT II The application must be registered with the DoD Ports and
Protocols Database.
0 0
APSC-DV-002995 - CAT II The Configuration Management (CM) repository must be properly
patched and STIG compliant.
0 0
APSC-DV-003000 - CAT II Access privileges to the Configuration Management (CM)
repository must be reviewed every three months.
0 0
APSC-DV-003010 - CAT II A Software Configuration Management (SCM) plan describing the
configuration control and change management process of application objects developed by
the organization and the roles and responsibilities of the organization must be created and
maintained.
0 0
APSC-DV-003020 - CAT II A Configuration Control Board (CCB) that meets at least every
release cycle, for managing the Configuration Management (CM) process must be
established.
0 0
APSC-DV-003030 - CAT II The application services and interfaces must be compatible with
and ready for IPv6 networks.
0 0
APSC-DV-003040 - CAT II The application must not be hosted on a general purpose
machine if the application is designated as critical or high availability by the ISSO.
0 0
APSC-DV-003050 - CAT II A disaster recovery/continuity plan must exist in accordance with
DoD policy based on the applications availability requirements.
0 0
APSC-DV-003060 - CAT II Recovery procedures and technical system features must exist so
recovery is performed in a secure and verifiable manner. The ISSO will document
circumstances inhibiting a trusted recovery.
0 0
APSC-DV-003070 - CAT II Data backup must be performed at required intervals in
accordance with DoD policy.
0 0
APSC-DV-003080 - CAT II Back-up copies of the application software or source code must
be stored in a fire-rated container or stored separately (offsite).
0 0
APSC-DV-003090 - CAT II Procedures must be in place to assure the appropriate physical
and technical protection of the backup and restoration of the application.
0 0
APSC-DV-003100 - CAT II The application must use encryption to implement key exchange
and authenticate endpoints prior to establishing a communication channel for key exchange.
0 0
APSC-DV-003110 - CAT I The application must not contain embedded authentication data. 0 0
APSC-DV-003120 - CAT I The application must have the capability to mark
sensitive/classified output when required.
0 0
APSC-DV-003130 - CAT III Prior to each release of the application, updates to system, or
applying patches; tests plans and procedures must be created and executed.
0 0
APSC-DV-003150 - CAT II At least one tester must be designated to test for security flaws
in addition to functional testing.
0 0
APSC-DV-003140 - CAT II Application files must be cryptographically hashed prior to
deploying to DoD operational networks.
0 0
APSC-DV-003160 - CAT III Test procedures must be created and at least annually executed
to ensure system initialization, shutdown, and aborts are configured to verify the system
remains in a secure state.
0 0
APSC-DV-003170 - CAT II An application code review must be performed on the application. 0 0
APSC-DV-003180 - CAT III Code coverage statistics must be maintained for each release of
the application.
0 0
APSC-DV-003190 - CAT II Flaws found during a code review must be tracked in a defect
tracking system.
0 0
APSC-DV-003200 - CAT II The changes to the application must be assessed for IA and
accreditation impact prior to implementation.
0 0
APSC-DV-003210 - CAT II Security flaws must be fixed or addressed in the project plan. 0 0
PAGE 32 OF 47
APSC-DV-003215 - CAT III The application development team must follow a set of coding
standards.
0 0
APSC-DV-003220 - CAT III The designer must create and update the Design Document for
each release of the application.
0 0
APSC-DV-003230 - CAT II Threat models must be documented and reviewed for each
application release and updated as required by design and functionality changes or when
new threats are discovered.
0 0
APSC-DV-003235 - CAT II The application must not be subject to error handling
vulnerabilities.*
0 0
APSC-DV-003250 - CAT I The application must be decommissioned when maintenance or
support is no longer available.
0 0
APSC-DV-003236 - CAT II The application development team must provide an application
incident response plan.
0 0
APSC-DV-003240 - CAT I All products must be supported by the vendor or the development
team.
0 0
APSC-DV-003260 - CAT III Procedures must be in place to notify users when an application
is decommissioned.
0 0
APSC-DV-003270 - CAT II Unnecessary built-in application accounts must be disabled. 0 0
APSC-DV-003280 - CAT I Default passwords must be changed. 0 0
APSC-DV-003330 - CAT II The system must alert an administrator when low resource
conditions are encountered.
0 0
APSC-DV-003285 - CAT II An Application Configuration Guide must be created and included
with the application.
0 0
APSC-DV-003290 - CAT II If the application contains classified data, a Security Classification
Guide must exist containing data elements and their classification.
0 0
APSC-DV-003300 - CAT II The designer must ensure uncategorized or emerging mobile
code is not used in applications.
0 0
APSC-DV-003310 - CAT II Production database exports must have database administration
credentials and sensitive data removed before releasing the export.
0 0
APSC-DV-003320 - CAT II Protections against DoS attacks must be implemented. 0 0
APSC-DV-003340 - CAT III At least one application administrator must be registered to
receive update notifications, or security alerts, when automated alerts are available.
0 0
APSC-DV-003360 - CAT III The application must generate audit records when concurrent
logons from different workstations occur.
0 0
APSC-DV-003345 - CAT III The application must provide notifications or alerts when product
update and security related patches are available.
0 0
APSC-DV-003350 - CAT II Connections between the DoD enclave and the Internet or other
public or commercial wide area networks must require a DMZ.
0 0
APSC-DV-003400 - CAT II The Program Manager must verify all levels of program
management, designers, developers, and testers receive annual security training pertaining
to their job function.
0 0
APSC-DV-000010 - CAT II The application must provide a capability to limit the number of
logon sessions per user.
0 0
APSC-DV-000060 - CAT II The application must clear temporary storage and cookies when
the session is terminated.
0 0
APSC-DV-000070 - CAT II The application must automatically terminate the non-privileged
user session and log off non-privileged users after a 15 minute idle time period has elapsed.
0 0
APSC-DV-000080 - CAT II The application must automatically terminate the admin user
session and log off admin users after a 10 minute idle time period is exceeded.
0 0
APSC-DV-000090 - CAT II Applications requiring user access authentication must provide a
logoff capability for user initiated communication session.
0 0
APSC-DV-000100 - CAT III The application must display an explicit logoff message to users
indicating the reliable termination of authenticated communications sessions.
0 0
APSC-DV-000110 - CAT II The application must associate organization-defined types of
security attributes having organization-defined security attribute values with information in
0 0
PAGE 33 OF 47
storage.
APSC-DV-000120 - CAT II The application must associate organization-defined types of
security attributes having organization-defined security attribute values with information in
process.
0 0
APSC-DV-000130 - CAT II The application must associate organization-defined types of
security attributes having organization-defined security attribute values with information in
transmission.
0 0
APSC-DV-000160 - CAT II The application must implement DoD-approved encryption to
protect the confidentiality of remote access sessions.
0 0
APSC-DV-000170 - CAT II The application must implement cryptographic mechanisms to
protect the integrity of remote access sessions.
0 0
APSC-DV-000190 - CAT I Messages protected with WS_Security must use time stamps with
creation and expiration times.
0 0
APSC-DV-000180 - CAT II Applications with SOAP messages requiring integrity must include
the following message elements:-Message ID-Service Request-Timestamp-SAML Assertion
(optionally included in messages) and all elements of the message must be digitally signed.
0 0
APSC-DV-000200 - CAT I Validity periods must be verified on all application messages using
WS-Security or SAML assertions.
0 0
APSC-DV-000210 - CAT II The application must ensure each unique asserting party provides
unique assertion ID references for each SAML assertion.
0 0
APSC-DV-000220 - CAT II The application must ensure encrypted assertions, or equivalent
confidentiality protections are used when assertion data is passed through an intermediary,
and confidentiality of the assertion data is required when passing through the intermediary.
0 0
APSC-DV-000230 - CAT I The application must use the NotOnOrAfter condition when using
the SubjectConfirmation element in a SAML assertion.
0 0
APSC-DV-000240 - CAT I The application must use both the NotBefore and NotOnOrAfter
elements or OneTimeUse element when using the Conditions element in a SAML assertion.
0 0
APSC-DV-000250 - CAT II The application must ensure if a OneTimeUse element is used in
an assertion, there is only one of the same used in the Conditions element portion of an
assertion.
0 0
APSC-DV-000260 - CAT II The application must ensure messages are encrypted when the
SessionIndex is tied to privacy data.
0 0
APSC-DV-000290 - CAT II Shared/group account credentials must be terminated when
members leave the group.
0 0
APSC-DV-000280 - CAT II The application must provide automated mechanisms for
supporting account management functions.
0 0
APSC-DV-000300 - CAT II The application must automatically remove or disable temporary
user accounts 72 hours after account creation.
0 0
APSC-DV-000320 - CAT III The application must automatically disable accounts after a 35
day period of account inactivity.
0 0
APSC-DV-000330 - CAT II Unnecessary application accounts must be disabled, or deleted. 0 0
APSC-DV-000420 - CAT II The application must automatically audit account enabling
actions.
0 0
APSC-DV-000340 - CAT II The application must automatically audit account creation. 0 0
APSC-DV-000350 - CAT II The application must automatically audit account modification. 0 0
APSC-DV-000360 - CAT II The application must automatically audit account disabling
actions.
0 0
APSC-DV-000370 - CAT II The application must automatically audit account removal
actions.
0 0
APSC-DV-000380 - CAT III The application must notify System Administrators and
Information System Security Officers when accounts are created.
0 0
APSC-DV-000390 - CAT III The application must notify System Administrators and
Information System Security Officers when accounts are modified.
0 0
APSC-DV-000400 - CAT III The application must notify System Administrators and
Information System Security Officers of account disabling actions.
0 0
PAGE 34 OF 47
APSC-DV-000410 - CAT III The application must notify System Administrators and
Information System Security Officers of account removal actions.
0 0
APSC-DV-000430 - CAT III The application must notify System Administrators and
Information System Security Officers of account enabling actions.
0 0
APSC-DV-000440 - CAT II Application data protection requirements must be identified and
documented.
0 0
APSC-DV-000520 - CAT II The application must audit the execution of privileged functions. 0 0
APSC-DV-000450 - CAT II The application must utilize organization-defined data mining
detection techniques for organization-defined data storage objects to adequately detect data
mining attempts.
0 0
APSC-DV-000460 - CAT I The application must enforce approved authorizations for logical
access to information and system resources in accordance with applicable access control
policies.
0 0
APSC-DV-000470 - CAT II The application must enforce organization-defined discretionary
access control policies over defined subjects and objects.
0 0
APSC-DV-000480 - CAT II The application must enforce approved authorizations for
controlling the flow of information within the system based on organization-defined
information flow control policies.
0 0
APSC-DV-000490 - CAT II The application must enforce approved authorizations for
controlling the flow of information between interconnected systems based on organization-
defined information flow control policies.
0 0
APSC-DV-000500 - CAT II The application must prevent non-privileged users from executing
privileged functions to include disabling, circumventing, or altering implemented security
safeguards/countermeasures.
0 0
APSC-DV-000510 - CAT I The application must execute without excessive account
permissions.
0 0
APSC-DV-000530 - CAT I The application must enforce the limit of three consecutive invalid
logon attempts by a user during a 15 minute time period.
0 0
APSC-DV-000560 - CAT III The application must retain the Standard Mandatory DoD Notice
and Consent Banner on the screen until users acknowledge the usage conditions and take
explicit actions to log on for further access.
0 0
APSC-DV-000540 - CAT II The application administrator must follow an approved process to
unlock locked user accounts.
0 0
APSC-DV-000550 - CAT III The application must display the Standard Mandatory DoD
Notice and Consent Banner before granting access to the application.
0 0
APSC-DV-000570 - CAT III The publicly accessible application must display the Standard
Mandatory DoD Notice and Consent Banner before granting access to the application.
0 0
APSC-DV-000580 - CAT III The application must display the time and date of the users last
successful logon.
0 0
APSC-DV-000630 - CAT II The application must provide audit record generation capability
for the destruction of session IDs.
0 0
APSC-DV-000590 - CAT II The application must protect against an individual (or process
acting on behalf of an individual) falsely denying having performed organization-defined
actions to be covered by non-repudiation.
0 0
APSC-DV-000600 - CAT II For applications providing audit record aggregation, the
application must compile audit records from organization-defined information system
components into a system-wide audit trail that is time-correlated with an organization-
defined level of tolerance
0 0
APSC-DV-000610 - CAT II The application must provide the capability for organization-
identified individuals or roles to change the auditing to be performed on all application
components, based on all selectable event criteria within organization-defined time
thresholds.
0 0
APSC-DV-000620 - CAT II The application must provide audit record generation capability
for the creation of session IDs.
0 0
* Project scan results do not include all relevant queries. Presets andor Filters should be changed to include all relevant
standard queries.
PAGE 35 OF 47
Scan Summary - OWASP Top 10 API
Category
Issues
Found
Best Fix
Locations
API1-Broken Object Level Authorization 0 0
API2-Broken Authentication* 0 0
API3-Excessive Data Exposure 13 13
API4-Lack of Resources and Rate Limiting 0 0
API5-Broken Function Level Authorization 0 0
API6-Mass Assignment 0 0
API7-Security Misconfiguration 213 189
API8-Injection* 0 0
API9-Improper Assets Management 0 0
API10-Insufficient Logging and Monitoring 0 0
* Project scan results do not include all relevant queries. Presets andor Filters should be changed to include all relevant
standard queries.
PAGE 36 OF 47
Scan Summary - OWASP Top 10 2010
Category
Issues
Found
Best Fix
Locations
A1-Injection 4 4
A2-Cross-Site Scripting (XSS)* 0 0
A3-Broken Authentication and Session Management* 0 0
A4-Insecure Direct Object References 0 0
A5-Cross-Site Request Forgery (CSRF) 0 0
A6-Security Misconfiguration 0 0
A7-Insecure Cryptographic Storage* 0 0
A8-Failure to Restrict URL Access 0 0
A9-Insufficient Transport Layer Protection 0 0
A10-Unvalidated Redirects and Forwards 19 16
* Project scan results do not include all relevant queries. Presets andor Filters should be changed to include all relevant
standard queries.
PAGE 37 OF 47
Scan Summary - MOIS(KISA) Secure Coding 2021
Category
Issues
Found
Best Fix
Locations
MOIS(KISA) API misuse* 0 0
MOIS(KISA) Code error* 9 9
MOIS(KISA) Encapsulation* 1 1
MOIS(KISA) Error processing* 194 194
MOIS(KISA) Security Functions* 221 128
MOIS(KISA) Time and status 0 0
MOIS(KISA) Verification and representation of input data* 409 232
* Project scan results do not include all relevant queries. Presets andor Filters should be changed to include all relevant
standard queries.
PAGE 38 OF 47
Scan Summary - SANS top 25
Category
Issues
Found
Best Fix
Locations
SANS top 25* 528 333
* Project scan results do not include all relevant queries. Presets andor Filters should be changed to include all relevant
standard queries.
PAGE 39 OF 47
Scan Summary - CWE top 25
Category
Issues
Found
Best Fix
Locations
CWE top 25* 532 337
* Project scan results do not include all relevant queries. Presets andor Filters should be changed to include all relevant
standard queries.
PAGE 40 OF 47
Scan Summary - Top Tier
Category
Issues
Found
Best Fix
Locations
Top Tier 28 17
PAGE 41 OF 47
Scan Summary - OWASP ASVS
Category
Issues
Found
Best Fix
Locations
V01 Architecture, Design and Threat Modeling* 231 231
V02 Authentication* 28 28
V03 Session Management 66 40
V04 Access Control 11 11
V05 Validation, Sanitization and Encoding* 264 112
V06 Stored Cryptography* 38 38
V07 Error Handling and Logging* 2872 973
V08 Data Protection 46 46
V09 Communication 1 1
V10 Malicious Code* 109 16
V11 Business Logic* 0 0
V12 Files and Resources* 6 5
V13 API and Web Service* 139 115
V14 Configuration 204 204
* Project scan results do not include all relevant queries. Presets andor Filters should be changed to include all relevant
standard queries.
PAGE 42 OF 47
Scan Summary - ASA Mobile Premium
Category
Issues
Found
Best Fix
Locations
ASA Mobile Premium* 0 0
* Project scan results do not include all relevant queries. Presets andor Filters should be changed to include all relevant
standard queries.
PAGE 43 OF 47
Scan Summary - ASA Premium
Category
Issues
Found
Best Fix
Locations
ASA Premium* 2919 775
* Project scan results do not include all relevant queries. Presets andor Filters should be changed to include all relevant
standard queries.
PAGE 44 OF 47
Results Distribution By Status Compared to project scan from 7/30/2024 7:42 AM
High Medium Low Information Total
New Issues 1 1 25 0 27
Recurrent Issues 31 403 2,884 775 4,093
Total 32 404 2,909 775 4,120
Fixed Issues 50 74 54 0 178
New Scan
Previous Scan
Results Distribution By State
High Medium Low Information Total
To Verify 31 404 2,909 775 4,119
Not Exploitable 1 0 0 0 1
Confirmed 0 0 0 0 0
Urgent 0 0 0 0 0
Proposed Not
Exploitable
0 0 0 0 0
Total 32 404 2,909 775 4,120
Result Summary
Vulnerability Type Occurrences Severity
Client DOM XSS 14 High
Reflected XSS All Clients 13 High
Prototype Pollution 4 High
Client DOM Stored XSS 1 High
CSRF 109 Medium
Privacy Violation 109 Medium
Client Potential XSS 94 Medium
PAGE 45 OF 47
Excessive Data Exposure 32 Medium
HttpOnlyCookies 20 Medium
SSRF 15 Medium
Path Traversal 4 Medium
Client Potential Code Injection 3 Medium
Insecure Cookie 3 Medium
Missing Column Encryption 3 Medium
Value Shadowing 3 Medium
Cookie Injection 2 Medium
No Request Validation 2 Medium
Missing HSTS Header 1 Medium
MVC View Injection 1 Medium
RequireSSL 1 Medium
Server DoS by loop 1 Medium
SSL Verification Bypass 1 Medium
Log Forging 2114 Low
Client JQuery Deprecated Symbols 229 Low
Improper Exception Handling 181 Low
Open Redirect 89 Low
Information Exposure via Headers 34 Low
Unencrypted Web Config File 34 Low
JavaScript Hijacking 30 Low
URL Canonicalization Issue 30 Low
Use Of Hardcoded Password 27 Low
Unsafe Use Of Target blank 25 Low
Client DOM Open Redirect 19 Low
Client Hardcoded Domain 19 Low
Information Exposure Through an Error Message 13 Low
Missing Function Level Authorization 11 Low
Unprotected Cookie 10 Low
Heap Inspection 9 Low
Improper Resource Shutdown or Release 9 Low
Missing X Frame Options 6 Low
Client Use Of Iframe Without Sandbox 5 Low
Improper Transaction Handling 5 Low
Potential Clickjacking on Legacy Browsers 2 Low
Potential ReDoS 2 Low
DebugEnabled 1 Low
Missing Content Security Policy 1 Low
Missing CSP Header 1 Low
Overly Permissive Cross Origin Resource Sharing Policy 1 Low
Use Of Broken Or Risky Cryptographic Algorithm 1 Low
Use of Insufficiently Random Values 1 Low
Insufficient Logging of Sensitive Operations 758 Information
Hardcoded Absolute Path 9 Information
Routed Deprecated Code 6 Information
Suspicious Endpoints 2 Information
10 Most Vulnerable Files
High and Medium Vulnerabilities
PAGE 46 OF 47
File Name Issues Found
Monotype.WhiteLabelCatalog.Web.Enterprise/Areas/Management/Contr
ollers/AuthenticationManagerController.cs
109
Monotype.WhiteLabelCatalog.Services/CachingService/RedisCacheServi
ce.cs
70
Monotype.WhiteLabelCatalog.Services/AuthenticationManagerService.c
s
68
Monotype.WhiteLabelCatalog.Services/CachingService/CachingServiceB
ase.cs
45
Monotype.WhiteLabelCatalog.Web.Enterprise/Scripts/modules/listapi.js 33
Monotype.WhiteLabelCatalog.Web.Enterprise/Scripts/modules/users.js 29
Monotype.WhiteLabelCatalog.Web.Enterprise/Controllers/CompanyCont
roller.cs
27
Monotype.WhiteLabelCatalog.Services/CustomerManagementService/C
ustomerAuthprovidersService.cs
26
Monotype.WhiteLabelCatalog.Services/Helper.cs 24
Monotype.WhiteLabelCatalog.Services/CustomerHierarchyService.cs 24
PAGE 47 OF 47
Scanned Languages
Language Hash Number Change Date
CSharp 0200160583847316 7/19/2023
JavaScript 5693733879119650 7/19/2023
VbScript 0386000544005133 11/24/2022
PLSQL 0342189457118079 7/19/2023
Common 1330881790325397 7/19/2023

More Related Content

PDF
PPTX
IT Security Essentials
PPTX
Cybersecurity Framework Luncheon Presentation 1-18-18.pptx
PDF
Today's Cyber Challenges: Methodology to Secure Your Business
PPTX
Security assessment isaca sv presentation jan 2016
PPTX
7-Software_Development_Security.pptx
PPTX
Delivering Security Within the MAX Remote Management Platform - Todd Haughland
PPTX
Security Baselines and Risk Assessments
IT Security Essentials
Cybersecurity Framework Luncheon Presentation 1-18-18.pptx
Today's Cyber Challenges: Methodology to Secure Your Business
Security assessment isaca sv presentation jan 2016
7-Software_Development_Security.pptx
Delivering Security Within the MAX Remote Management Platform - Todd Haughland
Security Baselines and Risk Assessments

Similar to Monotype Enterprise Complete Scan Report 2024 (20)

PPTX
On Common Ground: The Overlap of PCI DSS and Data Protection
PPTX
Cyber Risks Implementation on an IP MPLS Network
PDF
How can i find my security blind spots ulf mattsson - aug 2016
PPSX
Does audit make us more secure
PDF
Good-cyber-hygiene-at-scale-and-speed
PDF
PCI DSS in Pictures and What to Expect in PCI 3.0
PPT
Security Capability Model - InfoSec Forum VIII
PDF
Emerging Trends in Information Privacy and Security
PDF
Emerging Trends in Information Privacy and Security
PDF
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwd
PDF
Demonstrating Information Security Program Effectiveness
PDF
Proactive incident response
PDF
Cervone uof t - nist framework (1)
PDF
CyberSecurity Update Slides
PDF
cybersecurity-careers.pdf
PPTX
So You Want a Job in Cybersecurity
PPTX
Aligning Application Security to Compliance
PPTX
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
PPTX
11 19-2015 - iasaca membership conference - the state of security
PPTX
A guide to Sustainable Cyber Security
On Common Ground: The Overlap of PCI DSS and Data Protection
Cyber Risks Implementation on an IP MPLS Network
How can i find my security blind spots ulf mattsson - aug 2016
Does audit make us more secure
Good-cyber-hygiene-at-scale-and-speed
PCI DSS in Pictures and What to Expect in PCI 3.0
Security Capability Model - InfoSec Forum VIII
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwd
Demonstrating Information Security Program Effectiveness
Proactive incident response
Cervone uof t - nist framework (1)
CyberSecurity Update Slides
cybersecurity-careers.pdf
So You Want a Job in Cybersecurity
Aligning Application Security to Compliance
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
11 19-2015 - iasaca membership conference - the state of security
A guide to Sustainable Cyber Security
Ad

More from nopihab937 (7)

PDF
MT_Information-Security_CSC+18+Application+Security+Standard.pdf
PDF
Monotype Enterprise Level Network Diagram
PDF
Acceptable Use Policy of Monotype latest
DOCX
global policies Records Retention Policy.docx
PDF
Information Security Policy of Monotype
PDF
Monotype IS Policy Supplement for Information Technology, DevOps, Production ...
PPTX
Monotype Cybersecurity Security Report 2022
MT_Information-Security_CSC+18+Application+Security+Standard.pdf
Monotype Enterprise Level Network Diagram
Acceptable Use Policy of Monotype latest
global policies Records Retention Policy.docx
Information Security Policy of Monotype
Monotype IS Policy Supplement for Information Technology, DevOps, Production ...
Monotype Cybersecurity Security Report 2022
Ad

Recently uploaded (20)

PPTX
HR Introduction Slide (1).pptx on hr intro
PDF
COST SHEET- Tender and Quotation unit 2.pdf
PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
PDF
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
PDF
Cours de Système d'information about ERP.pdf
PDF
IFRS Notes in your pocket for study all the time
PDF
NewBase 12 August 2025 Energy News issue - 1812 by Khaled Al Awadi_compresse...
PPTX
Amazon (Business Studies) management studies
PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
PDF
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
PDF
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
PDF
Deliverable file - Regulatory guideline analysis.pdf
PPTX
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
PDF
Tata consultancy services case study shri Sharda college, basrur
PDF
Reconciliation AND MEMORANDUM RECONCILATION
PPT
Lecture 3344;;,,(,(((((((((((((((((((((((
PPTX
Principles of Marketing, Industrial, Consumers,
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
PPTX
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
PDF
Unit 1 Cost Accounting - Cost sheet
HR Introduction Slide (1).pptx on hr intro
COST SHEET- Tender and Quotation unit 2.pdf
Power and position in leadershipDOC-20250808-WA0011..pdf
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
Cours de Système d'information about ERP.pdf
IFRS Notes in your pocket for study all the time
NewBase 12 August 2025 Energy News issue - 1812 by Khaled Al Awadi_compresse...
Amazon (Business Studies) management studies
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
Deliverable file - Regulatory guideline analysis.pdf
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
Tata consultancy services case study shri Sharda college, basrur
Reconciliation AND MEMORANDUM RECONCILATION
Lecture 3344;;,,(,(((((((((((((((((((((((
Principles of Marketing, Industrial, Consumers,
Belch_12e_PPT_Ch18_Accessible_university.pptx
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
Unit 1 Cost Accounting - Cost sheet

Monotype Enterprise Complete Scan Report 2024

  • 1. PAGE 1 OF 47 MTF_ENTERPRISE Scan Report Project Name MTF_ENTERPRISE Scan Start Tuesday, July 30, 2024 8:34:45 AM Preset Checkmarx Default Scan Time 00h:01m:57s Lines Of Code Scanned 680003 Files Scanned 21712 Report Creation Time Tuesday, July 30, 2024 8:52:27 AM Online Results https://mti.checkmarx.net/CxWebClient/ViewerMain.aspx?scanid=103 8897&projectid=84 Team CxServer Checkmarx Version 9.5.5.1002 HF16 Scan Type Incremental Source Origin LocalPath Density 5/1000 (Vulnerabilities/LOC) Visibility Public Filter Settings Severity Included: High, Medium, Low, Information Excluded: None Result State Included: To Verify, Not Exploitable, Confirmed, Urgent, Proposed Not Exploitable Excluded: None Assigned to Included: All Categories Included: Uncategorized All Custom All PCI DSS v3.2.1 All OWASP Top 10 2013 All FISMA 2014 All NIST SP 800-53 All OWASP Top 10 2017 All OWASP Mobile Top 10 2016 All ASD STIG 4.10 All OWASP Top 10 API All OWASP Top 10 2010 All CWE top 25 All MOIS(KISA) Secure Coding 2021 All
  • 2. PAGE 2 OF 47 OWASP ASVS All OWASP Top 10 2021 All SANS top 25 All ASA Mobile Premium All ASA Premium All ASD STIG 5.2 All Top Tier All Excluded: Uncategorized None Custom None PCI DSS v3.2.1 None OWASP Top 10 2013 None FISMA 2014 None NIST SP 800-53 None OWASP Top 10 2017 None OWASP Mobile Top 10 2016 None ASD STIG 4.10 None OWASP Top 10 API None OWASP Top 10 2010 None CWE top 25 None MOIS(KISA) Secure Coding 2021 None OWASP ASVS None OWASP Top 10 2021 None SANS top 25 None ASA Mobile Premium None ASA Premium None ASD STIG 5.2 None Top Tier None Results Limit A limit was not defined Selected Queries Selected queries are listed in Result Summary
  • 3. PAGE 3 OF 47 Result Summary Most Vulnerable Files High Medium Low RedisCacheService.c s CustomerHierarchyS ervice.cs CachingServiceBase. cs CompanyController.c s UserController.cs Top 5 Vulnerabilities
  • 4. PAGE 4 OF 47 Scan Summary - OWASP Top 10 2017 Further details and elaboration about vulnerabilities and risks can be found at: OWASP Top 10 2017 Category Threat Agent Exploitability Weakness Prevalence Weakness Detectability Technical Impact Business Impact Issues Found Best Fix Locations A1-Injection* App. Specific EASY COMMON EASY SEVERE App. Specific 2122 222 A2-Broken Authentication* App. Specific EASY COMMON AVERAGE SEVERE App. Specific 27 27 A3-Sensitive Data Exposure* App. Specific AVERAGE WIDESPREAD AVERAGE SEVERE App. Specific 124 31 A4-XML External Entities (XXE) App. Specific AVERAGE COMMON EASY SEVERE App. Specific 0 0 A5-Broken Access Control* App. Specific AVERAGE COMMON AVERAGE SEVERE App. Specific 4 3 A6-Security Misconfiguration * App. Specific EASY WIDESPREAD EASY MODERATE App. Specific 17 17 A7-Cross-Site Scripting (XSS)* App. Specific EASY WIDESPREAD EASY MODERATE App. Specific 142 70 A8-Insecure Deserialization App. Specific DIFFICULT COMMON AVERAGE SEVERE App. Specific 0 0 A9-Using Components with Known Vulnerabilities* App. Specific AVERAGE WIDESPREAD AVERAGE MODERATE App. Specific 229 229 A10-Insufficient Logging & Monitoring App. Specific AVERAGE WIDESPREAD DIFFICULT MODERATE App. Specific 0 0 * Project scan results do not include all relevant queries. Presets andor Filters should be changed to include all relevant standard queries.
  • 5. PAGE 5 OF 47 Scan Summary - OWASP Top 10 2021 Category Issues Found Best Fix Locations A1-Broken Access Control* 440 221 A2-Cryptographic Failures* 12 12 A3-Injection* 137 64 A4-Insecure Design* 239 239 A5-Security Misconfiguration* 35 35 A6-Vulnerable and Outdated Components* 229 229 A7-Identification and Authentication Failures* 31 31 A8-Software and Data Integrity Failures* 35 31 A9-Security Logging and Monitoring Failures* 2872 973 A10-Server-Side Request Forgery 0 0 * Project scan results do not include all relevant queries. Presets andor Filters should be changed to include all relevant standard queries.
  • 6. PAGE 6 OF 47 Scan Summary - OWASP Top 10 2013 Further details and elaboration about vulnerabilities and risks can be found at: OWASP Top 10 2013 Category Threat Agent Attack Vectors Weakness Prevalence Weakness Detectability Technical Impact Business Impact Issues Found Best Fix Locations A1-Injection* EXTERNAL, INTERNAL, ADMIN USERS EASY COMMON AVERAGE SEVERE ALL DATA 6 5 A2-Broken Authentication and Session Management* EXTERNAL, INTERNAL USERS AVERAGE WIDESPREAD AVERAGE SEVERE AFFECTED DATA AND FUNCTIONS 27 27 A3-Cross-Site Scripting (XSS)* EXTERNAL, INTERNAL, ADMIN USERS AVERAGE VERY WIDESPREAD EASY MODERATE AFFECTED DATA AND SYSTEM 142 70 A4-Insecure Direct Object References* SYSTEM USERS EASY COMMON EASY MODERATE EXPOSED DATA 4 3 A5-Security Misconfiguration * EXTERNAL, INTERNAL, ADMIN USERS EASY COMMON EASY MODERATE ALL DATA AND SYSTEM 6 6 A6-Sensitive Data Exposure* EXTERNAL, INTERNAL, ADMIN USERS, USERS BROWSERS DIFFICULT UNCOMMON AVERAGE SEVERE EXPOSED DATA 123 30 A7-Missing Function Level Access Control* EXTERNAL, INTERNAL USERS EASY COMMON AVERAGE MODERATE EXPOSED DATA AND FUNCTIONS 0 0 A8-Cross-Site Request Forgery (CSRF)* USERS BROWSERS AVERAGE COMMON EASY MODERATE AFFECTED DATA AND FUNCTIONS 109 109 A9-Using Components with Known Vulnerabilities* EXTERNAL USERS, AUTOMATED TOOLS AVERAGE WIDESPREAD DIFFICULT MODERATE AFFECTED DATA AND FUNCTIONS 229 229 A10-Unvalidated Redirects and Forwards USERS BROWSERS AVERAGE WIDESPREAD DIFFICULT MODERATE AFFECTED DATA AND FUNCTIONS 108 33 * Project scan results do not include all relevant queries. Presets andor Filters should be changed to include all relevant standard queries.
  • 7. PAGE 7 OF 47 Scan Summary - PCI DSS v3.2.1 Category Issues Found Best Fix Locations PCI DSS (3.2.1) - 6.5.1 - Injection flaws - particularly SQL injection* 2229 236 PCI DSS (3.2.1) - 6.5.2 - Buffer overflows* 0 0 PCI DSS (3.2.1) - 6.5.3 - Insecure cryptographic storage* 28 28 PCI DSS (3.2.1) - 6.5.4 - Insecure communications* 1 1 PCI DSS (3.2.1) - 6.5.5 - Improper error handling* 204 204 PCI DSS (3.2.1) - 6.5.7 - Cross-site scripting (XSS)* 122 50 PCI DSS (3.2.1) - 6.5.8 - Improper access control* 123 22 PCI DSS (3.2.1) - 6.5.9 - Cross-site request forgery* 109 109 PCI DSS (3.2.1) - 6.5.10 - Broken authentication and session management* 0 0 * Project scan results do not include all relevant queries. Presets andor Filters should be changed to include all relevant standard queries.
  • 8. PAGE 8 OF 47 Scan Summary - FISMA 2014 Category Description Issues Found Best Fix Locations Access Control Organizations must limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems) and to the types of transactions and functions that authorized users are permitted to exercise. 109 44 Audit And Accountability* Organizations must: (i) create, protect, and retain information system audit records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful, unauthorized, or inappropriate information system activity; and (ii) ensure that the actions of individual information system users can be uniquely traced to those users so they can be held accountable for their actions. 0 0 Configuration Management* Organizations must: (i) establish and maintain baseline configurations and inventories of organizational information systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; and (ii) establish and enforce security configuration settings for information technology products employed in organizational information systems. 22 22 Identification And Authentication* Organizations must identify information system users, processes acting on behalf of users, or devices and authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. 139 46 Media Protection* Organizations must: (i) protect information system media, both paper and digital; (ii) limit access to information on information system media to authorized users; and (iii) sanitize or destroy information system media before disposal or release for reuse. 0 0 System And Communications Protection Organizations must: (i) monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems; and (ii) employ architectural designs, software development techniques, and systems engineering principles that promote effective information security within organizational information systems. 10 10 System And Information Integrity* Organizations must: (i) identify, report, and correct information and information system flaws in a timely manner; (ii) provide protection from malicious code at appropriate locations within organizational information systems; and (iii) monitor information system security alerts and advisories and take appropriate actions in response. 2267 285 * Project scan results do not include all relevant queries. Presets andor Filters should be changed to include all relevant standard queries.
  • 9. PAGE 9 OF 47 Scan Summary - NIST SP 800-53 Category Issues Found Best Fix Locations AC-12 Session Termination (P2) 0 0 AC-3 Access Enforcement (P1) 0 0 AC-4 Information Flow Enforcement (P1) 0 0 AC-6 Least Privilege (P1) 0 0 AU-9 Protection of Audit Information (P1)* 2114 215 CM-6 Configuration Settings (P2) 0 0 IA-5 Authenticator Management (P1) 0 0 IA-6 Authenticator Feedback (P2) 0 0 IA-8 Identification and Authentication (Non-Organizational Users) (P1) 0 0 SC-12 Cryptographic Key Establishment and Management (P1) 0 0 SC-13 Cryptographic Protection (P1) 1 1 SC-17 Public Key Infrastructure Certificates (P1) 0 0 SC-18 Mobile Code (P2) 30 26 SC-23 Session Authenticity (P1)* 109 109 SC-28 Protection of Information at Rest (P1)* 27 27 SC-4 Information in Shared Resources (P1) 109 16 SC-5 Denial of Service Protection (P1)* 193 193 SC-8 Transmission Confidentiality and Integrity (P1) 14 14 SI-10 Information Input Validation (P1)* 143 67 SI-11 Error Handling (P2)* 14 14 SI-15 Information Output Filtering (P0)* 122 50 SI-16 Memory Protection (P1)* 0 0 * Project scan results do not include all relevant queries. Presets andor Filters should be changed to include all relevant standard queries.
  • 10. PAGE 10 OF 47 Scan Summary - OWASP Mobile Top 10 2016 Category Description Issues Found Best Fix Locations M1-Improper Platform Usage This category covers misuse of a platform feature or failure to use platform security controls. It might include Android intents, platform permissions, misuse of TouchID, the Keychain, or some other security control that is part of the mobile operating system. There are several ways that mobile apps can experience this risk. 0 0 M2-Insecure Data Storage* This category covers insecure data storage and unintended data leakage. 0 0 M3-Insecure Communication* This category covers poor handshaking, incorrect SSL versions, weak negotiation, cleartext communication of sensitive assets, etc. 0 0 M4-Insecure Authentication* This category captures notions of authenticating the end user or bad session management. This can include: -Failing to identify the user at all when that should be required -Failure to maintain the user's identity when it is required -Weaknesses in session management 0 0 M5-Insufficient Cryptography The code applies cryptography to a sensitive information asset. However, the cryptography is insufficient in some way. Note that anything and everything related to TLS or SSL goes in M3. Also, if the app fails to use cryptography at all when it should, that probably belongs in M2. This category is for issues where cryptography was attempted, but it wasnt done correctly. 0 0 M6-Insecure Authorization This is a category to capture any failures in authorization (e.g., authorization decisions in the client side, forced browsing, etc.). It is distinct from authentication issues (e.g., device enrolment, user identification, etc.). If the app does not authenticate users at all in a situation where it should (e.g., granting anonymous access to some resource or service when authenticated and authorized access is required), then that is an authentication failure not an authorization failure. 0 0 M7-Client Code Quality* This category is the catch-all for code-level implementation problems in the mobile client. That's distinct from server-side coding mistakes. This would capture things like buffer overflows, format string vulnerabilities, and various other code-level mistakes where the solution is to rewrite some code that's running on the mobile device. 0 0 M8-Code Tampering This category covers binary patching, local resource modification, method hooking, method swizzling, and dynamic memory modification. Once the application is delivered to the mobile device, the code and data resources are resident there. An attacker can either directly modify the code, change the contents of memory dynamically, change or replace the system APIs that the 0 0
  • 11. PAGE 11 OF 47 application uses, or modify the application's data and resources. This can provide the attacker a direct method of subverting the intended use of the software for personal or monetary gain. M9-Reverse Engineering* This category includes analysis of the final core binary to determine its source code, libraries, algorithms, and other assets. Software such as IDA Pro, Hopper, otool, and other binary inspection tools give the attacker insight into the inner workings of the application. This may be used to exploit other nascent vulnerabilities in the application, as well as revealing information about back end servers, cryptographic constants and ciphers, and intellectual property. 0 0 M10-Extraneous Functionality* Often, developers include hidden backdoor functionality or other internal development security controls that are not intended to be released into a production environment. For example, a developer may accidentally include a password as a comment in a hybrid app. Another example includes disabling of 2- factor authentication during testing. 0 0 * Project scan results do not include all relevant queries. Presets andor Filters should be changed to include all relevant standard queries.
  • 12. PAGE 12 OF 47 Scan Summary - Custom Category Issues Found Best Fix Locations Must audit 0 0 Check 0 0 Optional 0 0
  • 13. PAGE 13 OF 47 Scan Summary - ASD STIG 4.10 Category Issues Found Best Fix Locations APSC-DV-000640 - CAT II The application must provide audit record generation capability for the renewal of session IDs. 0 0 APSC-DV-000650 - CAT II The application must not write sensitive data into the application logs. 0 0 APSC-DV-000660 - CAT II The application must provide audit record generation capability for session timeouts. 0 0 APSC-DV-000670 - CAT II The application must record a time stamp indicating when the event occurred. 0 0 APSC-DV-000680 - CAT II The application must provide audit record generation capability for HTTP headers including User-Agent, Referer, GET, and POST. 0 0 APSC-DV-000690 - CAT II The application must provide audit record generation capability for connecting system IP addresses. 0 0 APSC-DV-000700 - CAT II The application must record the username or user ID of the user associated with the event. 0 0 APSC-DV-000710 - CAT II The application must generate audit records when successful/unsuccessful attempts to grant privileges occur. 0 0 APSC-DV-000720 - CAT II The application must generate audit records when successful/unsuccessful attempts to access security objects occur. 0 0 APSC-DV-000730 - CAT II The application must generate audit records when successful/unsuccessful attempts to access security levels occur. 0 0 APSC-DV-000740 - CAT II The application must generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur. 0 0 APSC-DV-000750 - CAT II The application must generate audit records when successful/unsuccessful attempts to modify privileges occur. 0 0 APSC-DV-000760 - CAT II The application must generate audit records when successful/unsuccessful attempts to modify security objects occur. 0 0 APSC-DV-000770 - CAT II The application must generate audit records when successful/unsuccessful attempts to modify security levels occur. 0 0 APSC-DV-000780 - CAT II The application must generate audit records when successful/unsuccessful attempts to modify categories of information (e.g., classification levels) occur. 0 0 APSC-DV-000790 - CAT II The application must generate audit records when successful/unsuccessful attempts to delete privileges occur. 0 0 APSC-DV-000800 - CAT II The application must generate audit records when successful/unsuccessful attempts to delete security levels occur. 0 0 APSC-DV-000810 - CAT II The application must generate audit records when successful/unsuccessful attempts to delete application database security objects occur. 0 0 APSC-DV-000820 - CAT II The application must generate audit records when successful/unsuccessful attempts to delete categories of information (e.g., classification levels) occur. 0 0 APSC-DV-000830 - CAT II The application must generate audit records when successful/unsuccessful logon attempts occur. 0 0 APSC-DV-000840 - CAT II The application must generate audit records for privileged activities or other system-level access. 0 0 APSC-DV-000850 - CAT II The application must generate audit records showing starting and ending time for user access to the system. 0 0 APSC-DV-000860 - CAT II The application must generate audit records when successful/unsuccessful accesses to objects occur. 0 0
  • 14. PAGE 14 OF 47 APSC-DV-000870 - CAT II The application must generate audit records for all direct access to the information system. 0 0 APSC-DV-000880 - CAT II The application must generate audit records for all account creations, modifications, disabling, and termination events. 0 0 APSC-DV-000910 - CAT II The application must initiate session auditing upon startup. 0 0 APSC-DV-000940 - CAT II The application must log application shutdown events. 0 0 APSC-DV-000950 - CAT II The application must log destination IP addresses. 0 0 APSC-DV-000960 - CAT II The application must log user actions involving access to data. 0 0 APSC-DV-000970 - CAT II The application must log user actions involving changes to data. 0 0 APSC-DV-000980 - CAT II The application must produce audit records containing information to establish when (date and time) the events occurred. 0 0 APSC-DV-000990 - CAT II The application must produce audit records containing enough information to establish which component, feature or function of the application triggered the audit event. 0 0 APSC-DV-001000 - CAT II When using centralized logging; the application must include a unique identifier in order to distinguish itself from other application logs. 0 0 APSC-DV-001010 - CAT II The application must produce audit records that contain information to establish the outcome of the events. 0 0 APSC-DV-001020 - CAT II The application must generate audit records containing information that establishes the identity of any individual or process associated with the event. 0 0 APSC-DV-001030 - CAT II The application must generate audit records containing the full- text recording of privileged commands or the individual identities of group account users. 0 0 APSC-DV-001040 - CAT II The application must implement transaction recovery logs when transaction based. 0 0 APSC-DV-001050 - CAT II The application must provide centralized management and configuration of the content to be captured in audit records generated by all application components. 0 0 APSC-DV-001070 - CAT II The application must off-load audit records onto a different system or media than the system being audited. 0 0 APSC-DV-001080 - CAT II The application must be configured to write application logs to a centralized log repository. 0 0 APSC-DV-001090 - CAT II The application must provide an immediate warning to the SA and ISSO (at a minimum) when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity. 0 0 APSC-DV-001100 - CAT II Applications categorized as having a moderate or high impact must provide an immediate real-time alert to the SA and ISSO (at a minimum) for all audit failure events. 0 0 APSC-DV-001110 - CAT II The application must alert the ISSO and SA (at a minimum) in the event of an audit processing failure. 0 0 APSC-DV-001120 - CAT II The application must shut down by default upon audit failure (unless availability is an overriding concern). 0 0 APSC-DV-001130 - CAT II The application must provide the capability to centrally review and analyze audit records from multiple components within the system. 0 0 APSC-DV-001140 - CAT II The application must provide the capability to filter audit records for events of interest based upon organization-defined criteria. 0 0 APSC-DV-001150 - CAT II The application must provide an audit reduction capability that supports on-demand reporting requirements. 0 0 APSC-DV-001160 - CAT II The application must provide an audit reduction capability that supports on-demand audit review and analysis. 0 0 APSC-DV-001170 - CAT II The application must provide an audit reduction capability that supports after-the-fact investigations of security incidents. 0 0 APSC-DV-001180 - CAT II The application must provide a report generation capability that supports on-demand audit review and analysis. 0 0 APSC-DV-001190 - CAT II The application must provide a report generation capability that 0 0
  • 15. PAGE 15 OF 47 supports on-demand reporting requirements. APSC-DV-001200 - CAT II The application must provide a report generation capability that supports after-the-fact investigations of security incidents. 0 0 APSC-DV-001210 - CAT II The application must provide an audit reduction capability that does not alter original content or time ordering of audit records. 0 0 APSC-DV-001220 - CAT II The application must provide a report generation capability that does not alter original content or time ordering of audit records. 0 0 APSC-DV-001250 - CAT II The applications must use internal system clocks to generate time stamps for audit records. 0 0 APSC-DV-001260 - CAT II The application must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT). 0 0 APSC-DV-001270 - CAT II The application must record time stamps for audit records that meet a granularity of one second for a minimum degree of precision. 0 0 APSC-DV-001280 - CAT II The application must protect audit information from any type of unauthorized read access. 0 0 APSC-DV-001290 - CAT II The application must protect audit information from unauthorized modification. 0 0 APSC-DV-001300 - CAT II The application must protect audit information from unauthorized deletion. 0 0 APSC-DV-001310 - CAT II The application must protect audit tools from unauthorized access. 0 0 APSC-DV-001320 - CAT II The application must protect audit tools from unauthorized modification. 0 0 APSC-DV-001330 - CAT II The application must protect audit tools from unauthorized deletion. 0 0 APSC-DV-001340 - CAT II The application must back up audit records at least every seven days onto a different system or system component than the system or component being audited. 0 0 APSC-DV-001570 - CAT II The application must electronically verify Personal Identity Verification (PIV) credentials. 0 0 APSC-DV-001350 - CAT II The application must use cryptographic mechanisms to protect the integrity of audit information. 0 0 APSC-DV-001360 - CAT II Application audit tools must be cryptographically hashed. 0 0 APSC-DV-001370 - CAT II The integrity of the audit tools must be validated by checking the files for changes in the cryptographic hash value. 0 0 APSC-DV-001390 - CAT II The application must prohibit user installation of software without explicit privileged status. 0 0 APSC-DV-001410 - CAT II The application must enforce access restrictions associated with changes to application configuration. 0 0 APSC-DV-001420 - CAT II The application must audit who makes configuration changes to the application. 0 0 APSC-DV-001430 - CAT II The application must have the capability to prevent the installation of patches, service packs, or application components without verification the software component has been digitally signed using a certificate that is recognized and approved by the orga 0 0 APSC-DV-001440 - CAT II The applications must limit privileges to change the software resident within software libraries. 0 0 APSC-DV-001460 - CAT II An application vulnerability assessment must be conducted. 0 0 APSC-DV-001480 - CAT II The application must prevent program execution in accordance with organization-defined policies regarding software program usage and restrictions, and/or rules authorizing the terms and conditions of software program usage. 0 0 APSC-DV-001490 - CAT II The application must employ a deny-all, permit-by-exception (whitelist) policy to allow the execution of authorized software programs. 0 0 APSC-DV-001500 - CAT II The application must be configured to disable non-essential capabilities. 0 0
  • 16. PAGE 16 OF 47 APSC-DV-001510 - CAT II The application must be configured to use only functions, ports, and protocols permitted to it in the PPSM CAL. 0 0 APSC-DV-001520 - CAT II The application must require users to reauthenticate when organization-defined circumstances or situations require reauthentication. 0 0 APSC-DV-001530 - CAT II The application must require devices to reauthenticate when organization-defined circumstances or situations requiring reauthentication. 0 0 APSC-DV-001540 - CAT I The application must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users). 0 0 APSC-DV-001550 - CAT II The application must use multifactor (Alt. Token) authentication for network access to privileged accounts. 0 0 APSC-DV-001560 - CAT II The application must accept Personal Identity Verification (PIV) credentials. 0 0 APSC-DV-001580 - CAT II The application must use multifactor (e.g., CAC, Alt. Token) authentication for network access to non-privileged accounts. 0 0 APSC-DV-001590 - CAT II The application must use multifactor (Alt. Token) authentication for local access to privileged accounts. 0 0 APSC-DV-001600 - CAT II The application must use multifactor (e.g., CAC, Alt. Token) authentication for local access to non-privileged accounts. 0 0 APSC-DV-001610 - CAT II The application must ensure users are authenticated with an individual authenticator prior to using a group authenticator. 0 0 APSC-DV-001620 - CAT II The application must implement replay-resistant authentication mechanisms for network access to privileged accounts. 0 0 APSC-DV-001630 - CAT II The application must implement replay-resistant authentication mechanisms for network access to non-privileged accounts. 0 0 APSC-DV-001640 - CAT II The application must utilize mutual authentication when endpoint device non-repudiation protections are required by DoD policy or by the data owner. 0 0 APSC-DV-001650 - CAT II The application must authenticate all network connected endpoint devices before establishing any connection. 0 0 APSC-DV-001660 - CAT II Service-Oriented Applications handling non-releasable data must authenticate endpoint devices via mutual SSL/TLS. 0 0 APSC-DV-001670 - CAT II The application must disable device identifiers after 35 days of inactivity unless a cryptographic certificate is used for authentication. 0 0 APSC-DV-001680 - CAT I The application must enforce a minimum 15-character password length. 0 0 APSC-DV-001690 - CAT II The application must enforce password complexity by requiring that at least one upper-case character be used. 0 0 APSC-DV-001700 - CAT II The application must enforce password complexity by requiring that at least one lower-case character be used. 0 0 APSC-DV-001710 - CAT II The application must enforce password complexity by requiring that at least one numeric character be used. 0 0 APSC-DV-001720 - CAT II The application must enforce password complexity by requiring that at least one special character be used. 0 0 APSC-DV-001730 - CAT II The application must require the change of at least 8 of the total number of characters when passwords are changed. 0 0 APSC-DV-001740 - CAT I The application must only store cryptographic representations of passwords. 0 0 APSC-DV-001850 - CAT I The application must not display passwords/PINs as clear text. 0 0 APSC-DV-001750 - CAT I The application must transmit only cryptographically-protected passwords. 0 0 APSC-DV-001760 - CAT II The application must enforce 24 hours/1 day as the minimum password lifetime. 0 0 APSC-DV-001770 - CAT II The application must enforce a 60-day maximum password lifetime restriction. 0 0 APSC-DV-001780 - CAT II The application must prohibit password reuse for a minimum of five generations. 0 0
  • 17. PAGE 17 OF 47 APSC-DV-001790 - CAT II The application must allow the use of a temporary password for system logons with an immediate change to a permanent password. 0 0 APSC-DV-001795 - CAT II The application password must not be changeable by users other than the administrator or the user with which the password is associated. 0 0 APSC-DV-001800 - CAT II The application must terminate existing user sessions upon account deletion. 0 0 APSC-DV-001820 - CAT I The application, when using PKI-based authentication, must enforce authorized access to the corresponding private key. 0 0 APSC-DV-001830 - CAT II The application must map the authenticated identity to the individual user or group account for PKI-based authentication. 0 0 APSC-DV-001870 - CAT II The application must uniquely identify and authenticate non- organizational users (or processes acting on behalf of non-organizational users). 0 0 APSC-DV-001810 - CAT I The application, when utilizing PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor. 0 0 APSC-DV-001840 - CAT II The application, for PKI-based authentication, must implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network. 0 0 APSC-DV-001860 - CAT II The application must use mechanisms meeting the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module. 0 0 APSC-DV-001880 - CAT II The application must accept Personal Identity Verification (PIV) credentials from other federal agencies. 0 0 APSC-DV-001890 - CAT II The application must electronically verify Personal Identity Verification (PIV) credentials from other federal agencies. 0 0 APSC-DV-002050 - CAT II Applications making SAML assertions must use FIPS-approved random numbers in the generation of SessionIndex in the SAML element AuthnStatement. 0 0 APSC-DV-001900 - CAT II The application must accept FICAM-approved third-party credentials. 0 0 APSC-DV-001910 - CAT II The application must conform to FICAM-issued profiles. 0 0 APSC-DV-001930 - CAT II Applications used for non-local maintenance sessions must audit non-local maintenance and diagnostic sessions for organization-defined auditable events. 0 0 APSC-DV-000310 - CAT III The application must have a process, feature or function that prevents removal or disabling of emergency accounts. 0 0 APSC-DV-001940 - CAT II Applications used for non-local maintenance sessions must implement cryptographic mechanisms to protect the integrity of non-local maintenance and diagnostic communications. 0 0 APSC-DV-001950 - CAT II Applications used for non-local maintenance sessions must implement cryptographic mechanisms to protect the confidentiality of non-local maintenance and diagnostic communications. 0 0 APSC-DV-001960 - CAT II Applications used for non-local maintenance sessions must verify remote disconnection at the termination of non-local maintenance and diagnostic sessions. 0 0 APSC-DV-001970 - CAT II The application must employ strong authenticators in the establishment of non-local maintenance and diagnostic sessions. 0 0 APSC-DV-001980 - CAT II The application must terminate all sessions and network connections when non-local maintenance is completed. 0 0 APSC-DV-001995 - CAT II The application must not be vulnerable to race conditions. 0 0 APSC-DV-002000 - CAT II The application must terminate all network connections associated with a communications session at the end of the session. 0 0 APSC-DV-002010 - CAT II The application must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards. 0 0 APSC-DV-002020 - CAT II The application must utilize FIPS-validated cryptographic modules when signing application components. 0 0 APSC-DV-002030 - CAT II The application must utilize FIPS-validated cryptographic modules when generating cryptographic hashes. 0 0
  • 18. PAGE 18 OF 47 APSC-DV-002040 - CAT II The application must utilize FIPS-validated cryptographic modules when protecting unclassified information that requires cryptographic protection. 0 0 APSC-DV-002150 - CAT II The application user interface must be either physically or logically separated from data storage and management interfaces. 0 0 APSC-DV-002210 - CAT II The application must set the HTTPOnly flag on session cookies. 0 0 APSC-DV-002220 - CAT II The application must set the secure flag on session cookies. 0 0 APSC-DV-002230 - CAT I The application must not expose session IDs. 0 0 APSC-DV-002240 - CAT I The application must destroy the session ID value and/or cookie on logoff or browser close. 0 0 APSC-DV-002250 - CAT II Applications must use system-generated session identifiers that protect against session fixation. 0 0 APSC-DV-002260 - CAT II Applications must validate session identifiers. 0 0 APSC-DV-002270 - CAT II Applications must not use URL embedded session IDs. 0 0 APSC-DV-002280 - CAT II The application must not re-use or recycle session IDs. 0 0 APSC-DV-002290 - CAT II The application must use the Federal Information Processing Standard (FIPS) 140-2-validated cryptographic modules and random number generator if the application implements encryption, key exchange, digital signature, and hash functionality. 0 0 APSC-DV-002300 - CAT II The application must only allow the use of DoD-approved certificate authorities for verification of the establishment of protected sessions. 0 0 APSC-DV-002310 - CAT I The application must fail to a secure state if system initialization fails, shutdown fails, or aborts fail. 0 0 APSC-DV-002320 - CAT II In the event of a system failure, applications must preserve any information necessary to determine cause of failure and any information necessary to return to operations with least disruption to mission processes. 0 0 APSC-DV-002330 - CAT II The application must protect the confidentiality and integrity of stored information when required by DoD policy or the information owner. 0 0 APSC-DV-002340 - CAT II The application must implement approved cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest on organization-defined information system components. 0 0 APSC-DV-002350 - CAT II The application must use appropriate cryptography in order to protect stored DoD information when required by the information owner or DoD policy. 0 0 APSC-DV-002360 - CAT II The application must isolate security functions from non-security functions. 0 0 APSC-DV-002370 - CAT II The application must maintain a separate execution domain for each executing process. 0 0 APSC-DV-002380 - CAT II Applications must prevent unauthorized and unintended information transfer via shared system resources. 0 0 APSC-DV-002390 - CAT II XML-based applications must mitigate DoS attacks by using XML filters, parser options, or gateways. 0 0 APSC-DV-002400 - CAT II The application must restrict the ability to launch Denial of Service (DoS) attacks against itself or other information systems. 0 0 APSC-DV-002410 - CAT II The web service design must include redundancy mechanisms when used with high-availability systems. 0 0 APSC-DV-002420 - CAT II An XML firewall function must be deployed to protect web services when exposed to untrusted networks. 0 0 APSC-DV-002610 - CAT II The application must remove organization-defined software components after updated versions have been installed. 0 0 APSC-DV-002440 - CAT I The application must protect the confidentiality and integrity of transmitted information. 0 0 APSC-DV-002450 - CAT II The application must implement cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission unless otherwise protected by alternative physical safeguards, such as, at a minimum, a Prot 0 0 APSC-DV-002460 - CAT II The application must maintain the confidentiality and integrity of 0 0
  • 19. PAGE 19 OF 47 information during preparation for transmission. APSC-DV-002470 - CAT II The application must maintain the confidentiality and integrity of information during reception. 0 0 APSC-DV-002480 - CAT II The application must not disclose unnecessary information to users. 0 0 APSC-DV-002485 - CAT I The application must not store sensitive information in hidden fields. 0 0 APSC-DV-002490 - CAT I The application must protect from Cross-Site Scripting (XSS) vulnerabilities. 0 0 APSC-DV-002500 - CAT II The application must protect from Cross-Site Request Forgery (CSRF) vulnerabilities. 0 0 APSC-DV-002510 - CAT I The application must protect from command injection. 0 0 APSC-DV-002520 - CAT II The application must protect from canonical representation vulnerabilities. 0 0 APSC-DV-002530 - CAT II The application must validate all input. 0 0 APSC-DV-002540 - CAT I The application must not be vulnerable to SQL Injection. 0 0 APSC-DV-002550 - CAT I The application must not be vulnerable to XML-oriented attacks. 0 0 APSC-DV-002560 - CAT I The application must not be subject to input handling vulnerabilities. 0 0 APSC-DV-002570 - CAT II The application must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries. 0 0 APSC-DV-002580 - CAT II The application must reveal error messages only to the ISSO, ISSM, or SA. 0 0 APSC-DV-002590 - CAT I The application must not be vulnerable to overflow attacks. 0 0 APSC-DV-002630 - CAT II Security-relevant software updates and patches must be kept up to date. 0 0 APSC-DV-002760 - CAT II The application performing organization-defined security functions must verify correct operation of security functions. 0 0 APSC-DV-002900 - CAT II The ISSO must ensure application audit trails are retained for at least 1 year for applications without SAMI data, and 5 years for applications including SAMI data. 0 0 APSC-DV-002770 - CAT II The application must perform verification of the correct operation of security functions: upon system startup and/or restart; upon command by a user with privileged access; and/or every 30 days. 0 0 APSC-DV-002780 - CAT III The application must notify the ISSO and ISSM of failed security verification tests. 0 0 APSC-DV-002870 - CAT II Unsigned Category 1A mobile code must not be used in the application in accordance with DoD policy. 0 0 APSC-DV-002880 - CAT II The ISSO must ensure an account management process is implemented, verifying only authorized users can gain access to the application, and individual accounts designated as inactive, suspended, or terminated are promptly removed. 0 0 APSC-DV-002890 - CAT I Application web servers must be on a separate network segment from the application and database servers if it is a tiered application operating in the DoD DMZ. 0 0 APSC-DV-002910 - CAT II The ISSO must review audit trails periodically based on system documentation recommendations or immediately upon system security events. 0 0 APSC-DV-002920 - CAT II The ISSO must report all suspected violations of IA policies in accordance with DoD information system IA procedures. 0 0 APSC-DV-002930 - CAT II The ISSO must ensure active vulnerability testing is performed. 0 0 APSC-DV-002980 - CAT II New IP addresses, data services, and associated ports used by the application must be submitted to the appropriate approving authority for the organization, which in turn will be submitted through the DoD Ports, Protocols, and Services Management (DoD PPS 0 0 APSC-DV-002950 - CAT II Execution flow diagrams and design documents must be created 0 0
  • 20. PAGE 20 OF 47 to show how deadlock and recursion issues in web services are being mitigated. APSC-DV-002960 - CAT II The designer must ensure the application does not store configuration and control files in the same directory as user data. 0 0 APSC-DV-002970 - CAT II The ISSO must ensure if a DoD STIG or NSA guide is not available, a third-party product will be configured by following available guidance. 0 0 APSC-DV-002990 - CAT II The application must be registered with the DoD Ports and Protocols Database. 0 0 APSC-DV-002990 - CAT II The application must be registered with the DoD Ports and Protocols Database. 0 0 APSC-DV-002995 - CAT II The Configuration Management (CM) repository must be properly patched and STIG compliant. 0 0 APSC-DV-003000 - CAT II Access privileges to the Configuration Management (CM) repository must be reviewed every three months. 0 0 APSC-DV-003010 - CAT II A Software Configuration Management (SCM) plan describing the configuration control and change management process of application objects developed by the organization and the roles and responsibilities of the organization must be created and maintained. 0 0 APSC-DV-003020 - CAT II A Configuration Control Board (CCB) that meets at least every release cycle, for managing the Configuration Management (CM) process must be established. 0 0 APSC-DV-003030 - CAT II The application services and interfaces must be compatible with and ready for IPv6 networks. 0 0 APSC-DV-003040 - CAT II The application must not be hosted on a general purpose machine if the application is designated as critical or high availability by the ISSO. 0 0 APSC-DV-003050 - CAT II A disaster recovery/continuity plan must exist in accordance with DoD policy based on the applications availability requirements. 0 0 APSC-DV-003060 - CAT II Recovery procedures and technical system features must exist so recovery is performed in a secure and verifiable manner. The ISSO will document circumstances inhibiting a trusted recovery. 0 0 APSC-DV-003070 - CAT II Data backup must be performed at required intervals in accordance with DoD policy. 0 0 APSC-DV-003080 - CAT II Back-up copies of the application software or source code must be stored in a fire-rated container or stored separately (offsite). 0 0 APSC-DV-003090 - CAT II Procedures must be in place to assure the appropriate physical and technical protection of the backup and restoration of the application. 0 0 APSC-DV-003100 - CAT II The application must use encryption to implement key exchange and authenticate endpoints prior to establishing a communication channel for key exchange. 0 0 APSC-DV-003110 - CAT I The application must not contain embedded authentication data. 0 0 APSC-DV-003120 - CAT I The application must have the capability to mark sensitive/classified output when required. 0 0 APSC-DV-003130 - CAT III Prior to each release of the application, updates to system, or applying patches; tests plans and procedures must be created and executed. 0 0 APSC-DV-003150 - CAT II At least one tester must be designated to test for security flaws in addition to functional testing. 0 0 APSC-DV-003140 - CAT II Application files must be cryptographically hashed prior to deploying to DoD operational networks. 0 0 APSC-DV-003160 - CAT III Test procedures must be created and at least annually executed to ensure system initialization, shutdown, and aborts are configured to verify the system remains in a secure state. 0 0 APSC-DV-003170 - CAT II An application code review must be performed on the application. 0 0 APSC-DV-003180 - CAT III Code coverage statistics must be maintained for each release of the application. 0 0 APSC-DV-003190 - CAT II Flaws found during a code review must be tracked in a defect tracking system. 0 0 APSC-DV-003200 - CAT II The changes to the application must be assessed for IA and 0 0
  • 21. PAGE 21 OF 47 accreditation impact prior to implementation. APSC-DV-003210 - CAT II Security flaws must be fixed or addressed in the project plan. 0 0 APSC-DV-003215 - CAT III The application development team must follow a set of coding standards. 0 0 APSC-DV-003220 - CAT III The designer must create and update the Design Document for each release of the application. 0 0 APSC-DV-003230 - CAT II Threat models must be documented and reviewed for each application release and updated as required by design and functionality changes or when new threats are discovered. 0 0 APSC-DV-003235 - CAT II The application must not be subject to error handling vulnerabilities. 0 0 APSC-DV-003250 - CAT I The application must be decommissioned when maintenance or support is no longer available. 0 0 APSC-DV-003236 - CAT II The application development team must provide an application incident response plan. 0 0 APSC-DV-003240 - CAT I All products must be supported by the vendor or the development team. 0 0 APSC-DV-003260 - CAT III Procedures must be in place to notify users when an application is decommissioned. 0 0 APSC-DV-003270 - CAT II Unnecessary built-in application accounts must be disabled. 0 0 APSC-DV-003280 - CAT I Default passwords must be changed. 0 0 APSC-DV-003330 - CAT II The system must alert an administrator when low resource conditions are encountered. 0 0 APSC-DV-003285 - CAT II An Application Configuration Guide must be created and included with the application. 0 0 APSC-DV-003290 - CAT II If the application contains classified data, a Security Classification Guide must exist containing data elements and their classification. 0 0 APSC-DV-003300 - CAT II The designer must ensure uncategorized or emerging mobile code is not used in applications. 0 0 APSC-DV-003310 - CAT II Production database exports must have database administration credentials and sensitive data removed before releasing the export. 0 0 APSC-DV-003320 - CAT II Protections against DoS attacks must be implemented. 0 0 APSC-DV-003340 - CAT III At least one application administrator must be registered to receive update notifications, or security alerts, when automated alerts are available. 0 0 APSC-DV-003360 - CAT III The application must generate audit records when concurrent logons from different workstations occur. 0 0 APSC-DV-003345 - CAT III The application must provide notifications or alerts when product update and security related patches are available. 0 0 APSC-DV-003350 - CAT II Connections between the DoD enclave and the Internet or other public or commercial wide area networks must require a DMZ. 0 0 APSC-DV-003400 - CAT II The Program Manager must verify all levels of program management, designers, developers, and testers receive annual security training pertaining to their job function. 0 0 APSC-DV-000010 - CAT II The application must provide a capability to limit the number of logon sessions per user. 0 0 APSC-DV-000060 - CAT II The application must clear temporary storage and cookies when the session is terminated. 0 0 APSC-DV-000070 - CAT II The application must automatically terminate the non-privileged user session and log off non-privileged users after a 15 minute idle time period has elapsed. 0 0 APSC-DV-000080 - CAT II The application must automatically terminate the admin user session and log off admin users after a 10 minute idle time period is exceeded. 0 0 APSC-DV-000090 - CAT II Applications requiring user access authentication must provide a logoff capability for user initiated communication session. 0 0 APSC-DV-000100 - CAT III The application must display an explicit logoff message to users 0 0
  • 22. PAGE 22 OF 47 indicating the reliable termination of authenticated communications sessions. APSC-DV-000110 - CAT II The application must associate organization-defined types of security attributes having organization-defined security attribute values with information in storage. 0 0 APSC-DV-000120 - CAT II The application must associate organization-defined types of security attributes having organization-defined security attribute values with information in process. 0 0 APSC-DV-000130 - CAT II The application must associate organization-defined types of security attributes having organization-defined security attribute values with information in transmission. 0 0 APSC-DV-000160 - CAT II The application must implement DoD-approved encryption to protect the confidentiality of remote access sessions. 0 0 APSC-DV-000170 - CAT II The application must implement cryptographic mechanisms to protect the integrity of remote access sessions. 0 0 APSC-DV-000190 - CAT I Messages protected with WS_Security must use time stamps with creation and expiration times. 0 0 APSC-DV-000180 - CAT II Applications with SOAP messages requiring integrity must include the following message elements:-Message ID-Service Request-Timestamp-SAML Assertion (optionally included in messages) and all elements of the message must be digitally signed. 0 0 APSC-DV-000200 - CAT I Validity periods must be verified on all application messages using WS-Security or SAML assertions. 0 0 APSC-DV-000210 - CAT II The application must ensure each unique asserting party provides unique assertion ID references for each SAML assertion. 0 0 APSC-DV-000220 - CAT II The application must ensure encrypted assertions, or equivalent confidentiality protections are used when assertion data is passed through an intermediary, and confidentiality of the assertion data is required when passing through the intermediary. 0 0 APSC-DV-000230 - CAT I The application must use the NotOnOrAfter condition when using the SubjectConfirmation element in a SAML assertion. 0 0 APSC-DV-000240 - CAT I The application must use both the NotBefore and NotOnOrAfter elements or OneTimeUse element when using the Conditions element in a SAML assertion. 0 0 APSC-DV-000250 - CAT II The application must ensure if a OneTimeUse element is used in an assertion, there is only one of the same used in the Conditions element portion of an assertion. 0 0 APSC-DV-000260 - CAT II The application must ensure messages are encrypted when the SessionIndex is tied to privacy data. 0 0 APSC-DV-000290 - CAT II Shared/group account credentials must be terminated when members leave the group. 0 0 APSC-DV-000280 - CAT II The application must provide automated mechanisms for supporting account management functions. 0 0 APSC-DV-000300 - CAT II The application must automatically remove or disable temporary user accounts 72 hours after account creation. 0 0 APSC-DV-000320 - CAT III The application must automatically disable accounts after a 35 day period of account inactivity. 0 0 APSC-DV-000330 - CAT II Unnecessary application accounts must be disabled, or deleted. 0 0 APSC-DV-000420 - CAT II The application must automatically audit account enabling actions. 0 0 APSC-DV-000340 - CAT II The application must automatically audit account creation. 0 0 APSC-DV-000350 - CAT II The application must automatically audit account modification. 0 0 APSC-DV-000360 - CAT II The application must automatically audit account disabling actions. 0 0 APSC-DV-000370 - CAT II The application must automatically audit account removal actions. 0 0 APSC-DV-000380 - CAT III The application must notify System Administrators and Information System Security Officers when accounts are created. 0 0 APSC-DV-000390 - CAT III The application must notify System Administrators and 0 0
  • 23. PAGE 23 OF 47 Information System Security Officers when accounts are modified. APSC-DV-000400 - CAT III The application must notify System Administrators and Information System Security Officers of account disabling actions. 0 0 APSC-DV-000410 - CAT III The application must notify System Administrators and Information System Security Officers of account removal actions. 0 0 APSC-DV-000430 - CAT III The application must notify System Administrators and Information System Security Officers of account enabling actions. 0 0 APSC-DV-000440 - CAT II Application data protection requirements must be identified and documented. 0 0 APSC-DV-000520 - CAT II The application must audit the execution of privileged functions. 0 0 APSC-DV-000450 - CAT II The application must utilize organization-defined data mining detection techniques for organization-defined data storage objects to adequately detect data mining attempts. 0 0 APSC-DV-000460 - CAT I The application must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies. 0 0 APSC-DV-000470 - CAT II The application must enforce organization-defined discretionary access control policies over defined subjects and objects. 0 0 APSC-DV-000480 - CAT II The application must enforce approved authorizations for controlling the flow of information within the system based on organization-defined information flow control policies. 0 0 APSC-DV-000490 - CAT II The application must enforce approved authorizations for controlling the flow of information between interconnected systems based on organization- defined information flow control policies. 0 0 APSC-DV-000500 - CAT II The application must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures. 0 0 APSC-DV-000510 - CAT I The application must execute without excessive account permissions. 0 0 APSC-DV-000530 - CAT I The application must enforce the limit of three consecutive invalid logon attempts by a user during a 15 minute time period. 0 0 APSC-DV-000560 - CAT III The application must retain the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access. 0 0 APSC-DV-000540 - CAT II The application administrator must follow an approved process to unlock locked user accounts. 0 0 APSC-DV-000550 - CAT III The application must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the application. 0 0 APSC-DV-000570 - CAT III The publicly accessible application must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the application. 0 0 APSC-DV-000580 - CAT III The application must display the time and date of the users last successful logon. 0 0 APSC-DV-000630 - CAT II The application must provide audit record generation capability for the destruction of session IDs. 0 0 APSC-DV-000590 - CAT II The application must protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation. 0 0 APSC-DV-000600 - CAT II For applications providing audit record aggregation, the application must compile audit records from organization-defined information system components into a system-wide audit trail that is time-correlated with an organization- defined level of tolerance 0 0 APSC-DV-000610 - CAT II The application must provide the capability for organization- identified individuals or roles to change the auditing to be performed on all application components, based on all selectable event criteria within organization-defined time thresholds. 0 0 APSC-DV-000620 - CAT II The application must provide audit record generation capability for the creation of session IDs. 0 0
  • 24. PAGE 24 OF 47 Scan Summary - ASD STIG 5.2 Category Issues Found Best Fix Locations APSC-DV-000640 - CAT II The application must provide audit record generation capability for the renewal of session IDs. 0 0 APSC-DV-000650 - CAT II The application must not write sensitive data into the application logs. 0 0 APSC-DV-000660 - CAT II The application must provide audit record generation capability for session timeouts. 0 0 APSC-DV-000670 - CAT II The application must record a time stamp indicating when the event occurred. 0 0 APSC-DV-000680 - CAT II The application must provide audit record generation capability for HTTP headers including User-Agent, Referer, GET, and POST. 0 0 APSC-DV-000690 - CAT II The application must provide audit record generation capability for connecting system IP addresses. 0 0 APSC-DV-000700 - CAT II The application must record the username or user ID of the user associated with the event. 0 0 APSC-DV-000710 - CAT II The application must generate audit records when successful/unsuccessful attempts to grant privileges occur. 0 0 APSC-DV-000720 - CAT II The application must generate audit records when successful/unsuccessful attempts to access security objects occur. 0 0 APSC-DV-000730 - CAT II The application must generate audit records when successful/unsuccessful attempts to access security levels occur. 0 0 APSC-DV-000740 - CAT II The application must generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur. 0 0 APSC-DV-000750 - CAT II The application must generate audit records when successful/unsuccessful attempts to modify privileges occur. 0 0 APSC-DV-000760 - CAT II The application must generate audit records when successful/unsuccessful attempts to modify security objects occur. 0 0 APSC-DV-000770 - CAT II The application must generate audit records when successful/unsuccessful attempts to modify security levels occur. 0 0 APSC-DV-000780 - CAT II The application must generate audit records when successful/unsuccessful attempts to modify categories of information (e.g., classification levels) occur. 0 0 APSC-DV-000790 - CAT II The application must generate audit records when successful/unsuccessful attempts to delete privileges occur. 0 0 APSC-DV-000800 - CAT II The application must generate audit records when successful/unsuccessful attempts to delete security levels occur. 0 0 APSC-DV-000810 - CAT II The application must generate audit records when successful/unsuccessful attempts to delete application database security objects occur. 0 0 APSC-DV-000820 - CAT II The application must generate audit records when successful/unsuccessful attempts to delete categories of information (e.g., classification levels) occur. 0 0 APSC-DV-000830 - CAT II The application must generate audit records when successful/unsuccessful logon attempts occur. 0 0 APSC-DV-000840 - CAT II The application must generate audit records for privileged activities or other system-level access. 0 0 APSC-DV-000850 - CAT II The application must generate audit records showing starting and ending time for user access to the system. 0 0 APSC-DV-000860 - CAT II The application must generate audit records when successful/unsuccessful accesses to objects occur. 0 0
  • 25. PAGE 25 OF 47 APSC-DV-000870 - CAT II The application must generate audit records for all direct access to the information system. 0 0 APSC-DV-000880 - CAT II The application must generate audit records for all account creations, modifications, disabling, and termination events. 0 0 APSC-DV-000910 - CAT II The application must initiate session auditing upon startup. 0 0 APSC-DV-000940 - CAT II The application must log application shutdown events. 0 0 APSC-DV-000950 - CAT II The application must log destination IP addresses. 0 0 APSC-DV-000960 - CAT II The application must log user actions involving access to data. 0 0 APSC-DV-000970 - CAT II The application must log user actions involving changes to data. 0 0 APSC-DV-000980 - CAT II The application must produce audit records containing information to establish when (date and time) the events occurred. 0 0 APSC-DV-000990 - CAT II The application must produce audit records containing enough information to establish which component, feature or function of the application triggered the audit event. 0 0 APSC-DV-001000 - CAT II When using centralized logging; the application must include a unique identifier in order to distinguish itself from other application logs. 0 0 APSC-DV-001010 - CAT II The application must produce audit records that contain information to establish the outcome of the events. 0 0 APSC-DV-001020 - CAT II The application must generate audit records containing information that establishes the identity of any individual or process associated with the event. 0 0 APSC-DV-001030 - CAT II The application must generate audit records containing the full- text recording of privileged commands or the individual identities of group account users. 0 0 APSC-DV-001040 - CAT II The application must implement transaction recovery logs when transaction based. 0 0 APSC-DV-001050 - CAT II The application must provide centralized management and configuration of the content to be captured in audit records generated by all application components. 0 0 APSC-DV-001070 - CAT II The application must off-load audit records onto a different system or media than the system being audited. 0 0 APSC-DV-001080 - CAT II The application must be configured to write application logs to a centralized log repository. 0 0 APSC-DV-001090 - CAT II The application must provide an immediate warning to the SA and ISSO (at a minimum) when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity. 0 0 APSC-DV-001100 - CAT II Applications categorized as having a moderate or high impact must provide an immediate real-time alert to the SA and ISSO (at a minimum) for all audit failure events. 0 0 APSC-DV-001110 - CAT II The application must alert the ISSO and SA (at a minimum) in the event of an audit processing failure. 0 0 APSC-DV-001120 - CAT II The application must shut down by default upon audit failure (unless availability is an overriding concern). 0 0 APSC-DV-001130 - CAT II The application must provide the capability to centrally review and analyze audit records from multiple components within the system. 0 0 APSC-DV-001140 - CAT II The application must provide the capability to filter audit records for events of interest based upon organization-defined criteria. 0 0 APSC-DV-001150 - CAT II The application must provide an audit reduction capability that supports on-demand reporting requirements. 0 0 APSC-DV-001160 - CAT II The application must provide an audit reduction capability that supports on-demand audit review and analysis. 0 0 APSC-DV-001170 - CAT II The application must provide an audit reduction capability that supports after-the-fact investigations of security incidents. 0 0 APSC-DV-001180 - CAT II The application must provide a report generation capability that supports on-demand audit review and analysis. 0 0 APSC-DV-001190 - CAT II The application must provide a report generation capability that 0 0
  • 26. PAGE 26 OF 47 supports on-demand reporting requirements. APSC-DV-001200 - CAT II The application must provide a report generation capability that supports after-the-fact investigations of security incidents. 0 0 APSC-DV-001210 - CAT II The application must provide an audit reduction capability that does not alter original content or time ordering of audit records. 0 0 APSC-DV-001220 - CAT II The application must provide a report generation capability that does not alter original content or time ordering of audit records. 0 0 APSC-DV-001250 - CAT II The applications must use internal system clocks to generate time stamps for audit records. 0 0 APSC-DV-001260 - CAT II The application must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT). 0 0 APSC-DV-001270 - CAT II The application must record time stamps for audit records that meet a granularity of one second for a minimum degree of precision. 0 0 APSC-DV-001280 - CAT II The application must protect audit information from any type of unauthorized read access. 0 0 APSC-DV-001290 - CAT II The application must protect audit information from unauthorized modification. 0 0 APSC-DV-001300 - CAT II The application must protect audit information from unauthorized deletion. 0 0 APSC-DV-001310 - CAT II The application must protect audit tools from unauthorized access. 0 0 APSC-DV-001320 - CAT II The application must protect audit tools from unauthorized modification. 0 0 APSC-DV-001330 - CAT II The application must protect audit tools from unauthorized deletion. 0 0 APSC-DV-001340 - CAT II The application must back up audit records at least every seven days onto a different system or system component than the system or component being audited. 0 0 APSC-DV-001570 - CAT II The application must electronically verify Personal Identity Verification (PIV) credentials. 0 0 APSC-DV-001350 - CAT II The application must use cryptographic mechanisms to protect the integrity of audit information. 0 0 APSC-DV-001360 - CAT II Application audit tools must be cryptographically hashed. 0 0 APSC-DV-001370 - CAT II The integrity of the audit tools must be validated by checking the files for changes in the cryptographic hash value. 0 0 APSC-DV-001390 - CAT II The application must prohibit user installation of software without explicit privileged status. 0 0 APSC-DV-001410 - CAT II The application must enforce access restrictions associated with changes to application configuration. 0 0 APSC-DV-001420 - CAT II The application must audit who makes configuration changes to the application. 0 0 APSC-DV-001430 - CAT II The application must have the capability to prevent the installation of patches, service packs, or application components without verification the software component has been digitally signed using a certificate that is recognized and approved by the orga 0 0 APSC-DV-001440 - CAT II The applications must limit privileges to change the software resident within software libraries. 0 0 APSC-DV-001460 - CAT II An application vulnerability assessment must be conducted. 0 0 APSC-DV-001480 - CAT II The application must prevent program execution in accordance with organization-defined policies regarding software program usage and restrictions, and/or rules authorizing the terms and conditions of software program usage. 0 0 APSC-DV-001490 - CAT II The application must employ a deny-all, permit-by-exception (whitelist) policy to allow the execution of authorized software programs. 0 0 APSC-DV-001500 - CAT II The application must be configured to disable non-essential capabilities. 0 0
  • 27. PAGE 27 OF 47 APSC-DV-001510 - CAT II The application must be configured to use only functions, ports, and protocols permitted to it in the PPSM CAL. 0 0 APSC-DV-001520 - CAT II The application must require users to reauthenticate when organization-defined circumstances or situations require reauthentication. 0 0 APSC-DV-001530 - CAT II The application must require devices to reauthenticate when organization-defined circumstances or situations requiring reauthentication. 0 0 APSC-DV-001540 - CAT I The application must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users). 0 0 APSC-DV-001550 - CAT II The application must use multifactor (Alt. Token) authentication for network access to privileged accounts. 0 0 APSC-DV-001560 - CAT II The application must accept Personal Identity Verification (PIV) credentials. 0 0 APSC-DV-001580 - CAT II The application must use multifactor (e.g., CAC, Alt. Token) authentication for network access to non-privileged accounts. 0 0 APSC-DV-001590 - CAT II The application must use multifactor (Alt. Token) authentication for local access to privileged accounts. 0 0 APSC-DV-001600 - CAT II The application must use multifactor (e.g., CAC, Alt. Token) authentication for local access to non-privileged accounts. 0 0 APSC-DV-001610 - CAT II The application must ensure users are authenticated with an individual authenticator prior to using a group authenticator. 0 0 APSC-DV-001620 - CAT II The application must implement replay-resistant authentication mechanisms for network access to privileged accounts. 6 6 APSC-DV-001630 - CAT II The application must implement replay-resistant authentication mechanisms for network access to non-privileged accounts. 0 0 APSC-DV-001640 - CAT II The application must utilize mutual authentication when endpoint device non-repudiation protections are required by DoD policy or by the data owner. 0 0 APSC-DV-001650 - CAT II The application must authenticate all network connected endpoint devices before establishing any connection. 0 0 APSC-DV-001660 - CAT II Service-Oriented Applications handling non-releasable data must authenticate endpoint devices via mutual SSL/TLS. 0 0 APSC-DV-001670 - CAT II The application must disable device identifiers after 35 days of inactivity unless a cryptographic certificate is used for authentication. 0 0 APSC-DV-001680 - CAT I The application must enforce a minimum 15-character password length.* 0 0 APSC-DV-001690 - CAT II The application must enforce password complexity by requiring that at least one upper-case character be used. 0 0 APSC-DV-001700 - CAT II The application must enforce password complexity by requiring that at least one lower-case character be used. 0 0 APSC-DV-001710 - CAT II The application must enforce password complexity by requiring that at least one numeric character be used. 0 0 APSC-DV-001720 - CAT II The application must enforce password complexity by requiring that at least one special character be used. 0 0 APSC-DV-001730 - CAT II The application must require the change of at least 8 of the total number of characters when passwords are changed. 0 0 APSC-DV-001740 - CAT I The application must only store cryptographic representations of passwords.* 27 27 APSC-DV-001850 - CAT I The application must not display passwords/PINs as clear text. 0 0 APSC-DV-001750 - CAT I The application must transmit only cryptographically-protected passwords. 0 0 APSC-DV-001760 - CAT II The application must enforce 24 hours/1 day as the minimum password lifetime. 0 0 APSC-DV-001770 - CAT II The application must enforce a 60-day maximum password lifetime restriction. 0 0 APSC-DV-001780 - CAT II The application must prohibit password reuse for a minimum of five generations. 0 0
  • 28. PAGE 28 OF 47 APSC-DV-001790 - CAT II The application must allow the use of a temporary password for system logons with an immediate change to a permanent password. 0 0 APSC-DV-001795 - CAT II The application password must not be changeable by users other than the administrator or the user with which the password is associated. 0 0 APSC-DV-001800 - CAT II The application must terminate existing user sessions upon account deletion. 0 0 APSC-DV-001820 - CAT I The application, when using PKI-based authentication, must enforce authorized access to the corresponding private key. 0 0 APSC-DV-001830 - CAT II The application must map the authenticated identity to the individual user or group account for PKI-based authentication. 0 0 APSC-DV-001870 - CAT II The application must uniquely identify and authenticate non- organizational users (or processes acting on behalf of non-organizational users). 0 0 APSC-DV-001810 - CAT I The application, when utilizing PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor. 0 0 APSC-DV-001840 - CAT II The application, for PKI-based authentication, must implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network. 0 0 APSC-DV-001860 - CAT II The application must use mechanisms meeting the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module. 0 0 APSC-DV-001880 - CAT II The application must accept Personal Identity Verification (PIV) credentials from other federal agencies. 0 0 APSC-DV-001890 - CAT II The application must electronically verify Personal Identity Verification (PIV) credentials from other federal agencies. 0 0 APSC-DV-002050 - CAT II Applications making SAML assertions must use FIPS-approved random numbers in the generation of SessionIndex in the SAML element AuthnStatement. 0 0 APSC-DV-001900 - CAT II The application must accept FICAM-approved third-party credentials. 0 0 APSC-DV-001910 - CAT II The application must conform to FICAM-issued profiles. 0 0 APSC-DV-001930 - CAT II Applications used for non-local maintenance sessions must audit non-local maintenance and diagnostic sessions for organization-defined auditable events. 0 0 APSC-DV-000310 - CAT III The application must have a process, feature or function that prevents removal or disabling of emergency accounts. 0 0 APSC-DV-001940 - CAT II Applications used for non-local maintenance sessions must implement cryptographic mechanisms to protect the integrity of non-local maintenance and diagnostic communications. 0 0 APSC-DV-001950 - CAT II Applications used for non-local maintenance sessions must implement cryptographic mechanisms to protect the confidentiality of non-local maintenance and diagnostic communications. 0 0 APSC-DV-001960 - CAT II Applications used for non-local maintenance sessions must verify remote disconnection at the termination of non-local maintenance and diagnostic sessions. 0 0 APSC-DV-001970 - CAT II The application must employ strong authenticators in the establishment of non-local maintenance and diagnostic sessions. 0 0 APSC-DV-001980 - CAT II The application must terminate all sessions and network connections when non-local maintenance is completed. 0 0 APSC-DV-001995 - CAT II The application must not be vulnerable to race conditions. 0 0 APSC-DV-002000 - CAT II The application must terminate all network connections associated with a communications session at the end of the session. 0 0 APSC-DV-002010 - CAT II The application must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards. 0 0 APSC-DV-002020 - CAT II The application must utilize FIPS-validated cryptographic modules when signing application components. 0 0 APSC-DV-002030 - CAT II The application must utilize FIPS-validated cryptographic modules when generating cryptographic hashes. 0 0
  • 29. PAGE 29 OF 47 APSC-DV-002040 - CAT II The application must utilize FIPS-validated cryptographic modules when protecting unclassified information that requires cryptographic protection. 0 0 APSC-DV-002150 - CAT II The application user interface must be either physically or logically separated from data storage and management interfaces. 0 0 APSC-DV-002210 - CAT II The application must set the HTTPOnly flag on session cookies. 20 20 APSC-DV-002220 - CAT II The application must set the secure flag on session cookies. 0 0 APSC-DV-002230 - CAT I The application must not expose session IDs.* 0 0 APSC-DV-002240 - CAT I The application must destroy the session ID value and/or cookie on logoff or browser close. 0 0 APSC-DV-002250 - CAT II Applications must use system-generated session identifiers that protect against session fixation. 0 0 APSC-DV-002260 - CAT II Applications must validate session identifiers. 0 0 APSC-DV-002270 - CAT II Applications must not use URL embedded session IDs. 0 0 APSC-DV-002280 - CAT II The application must not re-use or recycle session IDs. 0 0 APSC-DV-002290 - CAT II The application must use the Federal Information Processing Standard (FIPS) 140-2-validated cryptographic modules and random number generator if the application implements encryption, key exchange, digital signature, and hash functionality.* 0 0 APSC-DV-002300 - CAT II The application must only allow the use of DoD-approved certificate authorities for verification of the establishment of protected sessions. 1 1 APSC-DV-002310 - CAT I The application must fail to a secure state if system initialization fails, shutdown fails, or aborts fail. 0 0 APSC-DV-002320 - CAT II In the event of a system failure, applications must preserve any information necessary to determine cause of failure and any information necessary to return to operations with least disruption to mission processes. 0 0 APSC-DV-002330 - CAT II The application must protect the confidentiality and integrity of stored information when required by DoD policy or the information owner. 120 27 APSC-DV-002340 - CAT II The application must implement approved cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest on organization-defined information system components. 0 0 APSC-DV-002350 - CAT II The application must use appropriate cryptography in order to protect stored DoD information when required by the information owner or DoD policy. 0 0 APSC-DV-002360 - CAT II The application must isolate security functions from non-security functions. 0 0 APSC-DV-002370 - CAT II The application must maintain a separate execution domain for each executing process. 0 0 APSC-DV-002380 - CAT II Applications must prevent unauthorized and unintended information transfer via shared system resources. 0 0 APSC-DV-002390 - CAT II XML-based applications must mitigate DoS attacks by using XML filters, parser options, or gateways. 0 0 APSC-DV-002400 - CAT II The application must restrict the ability to launch Denial of Service (DoS) attacks against itself or other information systems.* 11 11 APSC-DV-002410 - CAT II The web service design must include redundancy mechanisms when used with high-availability systems. 0 0 APSC-DV-002420 - CAT II An XML firewall function must be deployed to protect web services when exposed to untrusted networks. 0 0 APSC-DV-002610 - CAT II The application must remove organization-defined software components after updated versions have been installed. 1 1 APSC-DV-002440 - CAT I The application must protect the confidentiality and integrity of transmitted information. 0 0 APSC-DV-002450 - CAT II The application must implement cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission unless otherwise protected by alternative physical safeguards, such as, at a minimum, a Prot 0 0 APSC-DV-002460 - CAT II The application must maintain the confidentiality and integrity of 3 3
  • 30. PAGE 30 OF 47 information during preparation for transmission. APSC-DV-002470 - CAT II The application must maintain the confidentiality and integrity of information during reception. 0 0 APSC-DV-002480 - CAT II The application must not disclose unnecessary information to users. 0 0 APSC-DV-002485 - CAT I The application must not store sensitive information in hidden fields. 0 0 APSC-DV-002490 - CAT I The application must protect from Cross-Site Scripting (XSS) vulnerabilities.* 122 50 APSC-DV-002500 - CAT II The application must protect from Cross-Site Request Forgery (CSRF) vulnerabilities.* 109 109 APSC-DV-002510 - CAT I The application must protect from command injection. 0 0 APSC-DV-002520 - CAT II The application must protect from canonical representation vulnerabilities. 0 0 APSC-DV-002530 - CAT II The application must validate all input.* 9 9 APSC-DV-002540 - CAT I The application must not be vulnerable to SQL Injection.* 0 0 APSC-DV-002550 - CAT I The application must not be vulnerable to XML-oriented attacks. 0 0 APSC-DV-002560 - CAT I The application must not be subject to input handling vulnerabilities.* 2210 238 APSC-DV-002570 - CAT II The application must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries. 194 194 APSC-DV-002580 - CAT II The application must reveal error messages only to the ISSO, ISSM, or SA.* 0 0 APSC-DV-002590 - CAT I The application must not be vulnerable to overflow attacks. 0 0 APSC-DV-002630 - CAT II Security-relevant software updates and patches must be kept up to date. 0 0 APSC-DV-002760 - CAT II The application performing organization-defined security functions must verify correct operation of security functions. 0 0 APSC-DV-002900 - CAT II The ISSO must ensure application audit trails are retained for at least 1 year for applications without SAMI data, and 5 years for applications including SAMI data. 0 0 APSC-DV-002770 - CAT II The application must perform verification of the correct operation of security functions: upon system startup and/or restart; upon command by a user with privileged access; and/or every 30 days. 0 0 APSC-DV-002780 - CAT III The application must notify the ISSO and ISSM of failed security verification tests. 0 0 APSC-DV-002870 - CAT II Unsigned Category 1A mobile code must not be used in the application in accordance with DoD policy. 0 0 APSC-DV-002880 - CAT II The ISSO must ensure an account management process is implemented, verifying only authorized users can gain access to the application, and individual accounts designated as inactive, suspended, or terminated are promptly removed. 0 0 APSC-DV-002890 - CAT I Application web servers must be on a separate network segment from the application and database servers if it is a tiered application operating in the DoD DMZ. 0 0 APSC-DV-002910 - CAT II The ISSO must review audit trails periodically based on system documentation recommendations or immediately upon system security events. 0 0 APSC-DV-002920 - CAT II The ISSO must report all suspected violations of IA policies in accordance with DoD information system IA procedures. 0 0 APSC-DV-002930 - CAT II The ISSO must ensure active vulnerability testing is performed. 0 0 APSC-DV-002980 - CAT II New IP addresses, data services, and associated ports used by the application must be submitted to the appropriate approving authority for the organization, which in turn will be submitted through the DoD Ports, Protocols, and Services Management (DoD PPS 0 0 APSC-DV-002950 - CAT II Execution flow diagrams and design documents must be created 0 0
  • 31. PAGE 31 OF 47 to show how deadlock and recursion issues in web services are being mitigated. APSC-DV-002960 - CAT II The designer must ensure the application does not store configuration and control files in the same directory as user data. 0 0 APSC-DV-002970 - CAT II The ISSO must ensure if a DoD STIG or NSA guide is not available, a third-party product will be configured by following available guidance. 0 0 APSC-DV-002990 - CAT II The application must be registered with the DoD Ports and Protocols Database. 0 0 APSC-DV-002995 - CAT II The Configuration Management (CM) repository must be properly patched and STIG compliant. 0 0 APSC-DV-003000 - CAT II Access privileges to the Configuration Management (CM) repository must be reviewed every three months. 0 0 APSC-DV-003010 - CAT II A Software Configuration Management (SCM) plan describing the configuration control and change management process of application objects developed by the organization and the roles and responsibilities of the organization must be created and maintained. 0 0 APSC-DV-003020 - CAT II A Configuration Control Board (CCB) that meets at least every release cycle, for managing the Configuration Management (CM) process must be established. 0 0 APSC-DV-003030 - CAT II The application services and interfaces must be compatible with and ready for IPv6 networks. 0 0 APSC-DV-003040 - CAT II The application must not be hosted on a general purpose machine if the application is designated as critical or high availability by the ISSO. 0 0 APSC-DV-003050 - CAT II A disaster recovery/continuity plan must exist in accordance with DoD policy based on the applications availability requirements. 0 0 APSC-DV-003060 - CAT II Recovery procedures and technical system features must exist so recovery is performed in a secure and verifiable manner. The ISSO will document circumstances inhibiting a trusted recovery. 0 0 APSC-DV-003070 - CAT II Data backup must be performed at required intervals in accordance with DoD policy. 0 0 APSC-DV-003080 - CAT II Back-up copies of the application software or source code must be stored in a fire-rated container or stored separately (offsite). 0 0 APSC-DV-003090 - CAT II Procedures must be in place to assure the appropriate physical and technical protection of the backup and restoration of the application. 0 0 APSC-DV-003100 - CAT II The application must use encryption to implement key exchange and authenticate endpoints prior to establishing a communication channel for key exchange. 0 0 APSC-DV-003110 - CAT I The application must not contain embedded authentication data. 0 0 APSC-DV-003120 - CAT I The application must have the capability to mark sensitive/classified output when required. 0 0 APSC-DV-003130 - CAT III Prior to each release of the application, updates to system, or applying patches; tests plans and procedures must be created and executed. 0 0 APSC-DV-003150 - CAT II At least one tester must be designated to test for security flaws in addition to functional testing. 0 0 APSC-DV-003140 - CAT II Application files must be cryptographically hashed prior to deploying to DoD operational networks. 0 0 APSC-DV-003160 - CAT III Test procedures must be created and at least annually executed to ensure system initialization, shutdown, and aborts are configured to verify the system remains in a secure state. 0 0 APSC-DV-003170 - CAT II An application code review must be performed on the application. 0 0 APSC-DV-003180 - CAT III Code coverage statistics must be maintained for each release of the application. 0 0 APSC-DV-003190 - CAT II Flaws found during a code review must be tracked in a defect tracking system. 0 0 APSC-DV-003200 - CAT II The changes to the application must be assessed for IA and accreditation impact prior to implementation. 0 0 APSC-DV-003210 - CAT II Security flaws must be fixed or addressed in the project plan. 0 0
  • 32. PAGE 32 OF 47 APSC-DV-003215 - CAT III The application development team must follow a set of coding standards. 0 0 APSC-DV-003220 - CAT III The designer must create and update the Design Document for each release of the application. 0 0 APSC-DV-003230 - CAT II Threat models must be documented and reviewed for each application release and updated as required by design and functionality changes or when new threats are discovered. 0 0 APSC-DV-003235 - CAT II The application must not be subject to error handling vulnerabilities.* 0 0 APSC-DV-003250 - CAT I The application must be decommissioned when maintenance or support is no longer available. 0 0 APSC-DV-003236 - CAT II The application development team must provide an application incident response plan. 0 0 APSC-DV-003240 - CAT I All products must be supported by the vendor or the development team. 0 0 APSC-DV-003260 - CAT III Procedures must be in place to notify users when an application is decommissioned. 0 0 APSC-DV-003270 - CAT II Unnecessary built-in application accounts must be disabled. 0 0 APSC-DV-003280 - CAT I Default passwords must be changed. 0 0 APSC-DV-003330 - CAT II The system must alert an administrator when low resource conditions are encountered. 0 0 APSC-DV-003285 - CAT II An Application Configuration Guide must be created and included with the application. 0 0 APSC-DV-003290 - CAT II If the application contains classified data, a Security Classification Guide must exist containing data elements and their classification. 0 0 APSC-DV-003300 - CAT II The designer must ensure uncategorized or emerging mobile code is not used in applications. 0 0 APSC-DV-003310 - CAT II Production database exports must have database administration credentials and sensitive data removed before releasing the export. 0 0 APSC-DV-003320 - CAT II Protections against DoS attacks must be implemented. 0 0 APSC-DV-003340 - CAT III At least one application administrator must be registered to receive update notifications, or security alerts, when automated alerts are available. 0 0 APSC-DV-003360 - CAT III The application must generate audit records when concurrent logons from different workstations occur. 0 0 APSC-DV-003345 - CAT III The application must provide notifications or alerts when product update and security related patches are available. 0 0 APSC-DV-003350 - CAT II Connections between the DoD enclave and the Internet or other public or commercial wide area networks must require a DMZ. 0 0 APSC-DV-003400 - CAT II The Program Manager must verify all levels of program management, designers, developers, and testers receive annual security training pertaining to their job function. 0 0 APSC-DV-000010 - CAT II The application must provide a capability to limit the number of logon sessions per user. 0 0 APSC-DV-000060 - CAT II The application must clear temporary storage and cookies when the session is terminated. 0 0 APSC-DV-000070 - CAT II The application must automatically terminate the non-privileged user session and log off non-privileged users after a 15 minute idle time period has elapsed. 0 0 APSC-DV-000080 - CAT II The application must automatically terminate the admin user session and log off admin users after a 10 minute idle time period is exceeded. 0 0 APSC-DV-000090 - CAT II Applications requiring user access authentication must provide a logoff capability for user initiated communication session. 0 0 APSC-DV-000100 - CAT III The application must display an explicit logoff message to users indicating the reliable termination of authenticated communications sessions. 0 0 APSC-DV-000110 - CAT II The application must associate organization-defined types of security attributes having organization-defined security attribute values with information in 0 0
  • 33. PAGE 33 OF 47 storage. APSC-DV-000120 - CAT II The application must associate organization-defined types of security attributes having organization-defined security attribute values with information in process. 0 0 APSC-DV-000130 - CAT II The application must associate organization-defined types of security attributes having organization-defined security attribute values with information in transmission. 0 0 APSC-DV-000160 - CAT II The application must implement DoD-approved encryption to protect the confidentiality of remote access sessions. 0 0 APSC-DV-000170 - CAT II The application must implement cryptographic mechanisms to protect the integrity of remote access sessions. 0 0 APSC-DV-000190 - CAT I Messages protected with WS_Security must use time stamps with creation and expiration times. 0 0 APSC-DV-000180 - CAT II Applications with SOAP messages requiring integrity must include the following message elements:-Message ID-Service Request-Timestamp-SAML Assertion (optionally included in messages) and all elements of the message must be digitally signed. 0 0 APSC-DV-000200 - CAT I Validity periods must be verified on all application messages using WS-Security or SAML assertions. 0 0 APSC-DV-000210 - CAT II The application must ensure each unique asserting party provides unique assertion ID references for each SAML assertion. 0 0 APSC-DV-000220 - CAT II The application must ensure encrypted assertions, or equivalent confidentiality protections are used when assertion data is passed through an intermediary, and confidentiality of the assertion data is required when passing through the intermediary. 0 0 APSC-DV-000230 - CAT I The application must use the NotOnOrAfter condition when using the SubjectConfirmation element in a SAML assertion. 0 0 APSC-DV-000240 - CAT I The application must use both the NotBefore and NotOnOrAfter elements or OneTimeUse element when using the Conditions element in a SAML assertion. 0 0 APSC-DV-000250 - CAT II The application must ensure if a OneTimeUse element is used in an assertion, there is only one of the same used in the Conditions element portion of an assertion. 0 0 APSC-DV-000260 - CAT II The application must ensure messages are encrypted when the SessionIndex is tied to privacy data. 0 0 APSC-DV-000290 - CAT II Shared/group account credentials must be terminated when members leave the group. 0 0 APSC-DV-000280 - CAT II The application must provide automated mechanisms for supporting account management functions. 0 0 APSC-DV-000300 - CAT II The application must automatically remove or disable temporary user accounts 72 hours after account creation. 0 0 APSC-DV-000320 - CAT III The application must automatically disable accounts after a 35 day period of account inactivity. 0 0 APSC-DV-000330 - CAT II Unnecessary application accounts must be disabled, or deleted. 0 0 APSC-DV-000420 - CAT II The application must automatically audit account enabling actions. 0 0 APSC-DV-000340 - CAT II The application must automatically audit account creation. 0 0 APSC-DV-000350 - CAT II The application must automatically audit account modification. 0 0 APSC-DV-000360 - CAT II The application must automatically audit account disabling actions. 0 0 APSC-DV-000370 - CAT II The application must automatically audit account removal actions. 0 0 APSC-DV-000380 - CAT III The application must notify System Administrators and Information System Security Officers when accounts are created. 0 0 APSC-DV-000390 - CAT III The application must notify System Administrators and Information System Security Officers when accounts are modified. 0 0 APSC-DV-000400 - CAT III The application must notify System Administrators and Information System Security Officers of account disabling actions. 0 0
  • 34. PAGE 34 OF 47 APSC-DV-000410 - CAT III The application must notify System Administrators and Information System Security Officers of account removal actions. 0 0 APSC-DV-000430 - CAT III The application must notify System Administrators and Information System Security Officers of account enabling actions. 0 0 APSC-DV-000440 - CAT II Application data protection requirements must be identified and documented. 0 0 APSC-DV-000520 - CAT II The application must audit the execution of privileged functions. 0 0 APSC-DV-000450 - CAT II The application must utilize organization-defined data mining detection techniques for organization-defined data storage objects to adequately detect data mining attempts. 0 0 APSC-DV-000460 - CAT I The application must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies. 0 0 APSC-DV-000470 - CAT II The application must enforce organization-defined discretionary access control policies over defined subjects and objects. 0 0 APSC-DV-000480 - CAT II The application must enforce approved authorizations for controlling the flow of information within the system based on organization-defined information flow control policies. 0 0 APSC-DV-000490 - CAT II The application must enforce approved authorizations for controlling the flow of information between interconnected systems based on organization- defined information flow control policies. 0 0 APSC-DV-000500 - CAT II The application must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures. 0 0 APSC-DV-000510 - CAT I The application must execute without excessive account permissions. 0 0 APSC-DV-000530 - CAT I The application must enforce the limit of three consecutive invalid logon attempts by a user during a 15 minute time period. 0 0 APSC-DV-000560 - CAT III The application must retain the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access. 0 0 APSC-DV-000540 - CAT II The application administrator must follow an approved process to unlock locked user accounts. 0 0 APSC-DV-000550 - CAT III The application must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the application. 0 0 APSC-DV-000570 - CAT III The publicly accessible application must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the application. 0 0 APSC-DV-000580 - CAT III The application must display the time and date of the users last successful logon. 0 0 APSC-DV-000630 - CAT II The application must provide audit record generation capability for the destruction of session IDs. 0 0 APSC-DV-000590 - CAT II The application must protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation. 0 0 APSC-DV-000600 - CAT II For applications providing audit record aggregation, the application must compile audit records from organization-defined information system components into a system-wide audit trail that is time-correlated with an organization- defined level of tolerance 0 0 APSC-DV-000610 - CAT II The application must provide the capability for organization- identified individuals or roles to change the auditing to be performed on all application components, based on all selectable event criteria within organization-defined time thresholds. 0 0 APSC-DV-000620 - CAT II The application must provide audit record generation capability for the creation of session IDs. 0 0 * Project scan results do not include all relevant queries. Presets andor Filters should be changed to include all relevant standard queries.
  • 35. PAGE 35 OF 47 Scan Summary - OWASP Top 10 API Category Issues Found Best Fix Locations API1-Broken Object Level Authorization 0 0 API2-Broken Authentication* 0 0 API3-Excessive Data Exposure 13 13 API4-Lack of Resources and Rate Limiting 0 0 API5-Broken Function Level Authorization 0 0 API6-Mass Assignment 0 0 API7-Security Misconfiguration 213 189 API8-Injection* 0 0 API9-Improper Assets Management 0 0 API10-Insufficient Logging and Monitoring 0 0 * Project scan results do not include all relevant queries. Presets andor Filters should be changed to include all relevant standard queries.
  • 36. PAGE 36 OF 47 Scan Summary - OWASP Top 10 2010 Category Issues Found Best Fix Locations A1-Injection 4 4 A2-Cross-Site Scripting (XSS)* 0 0 A3-Broken Authentication and Session Management* 0 0 A4-Insecure Direct Object References 0 0 A5-Cross-Site Request Forgery (CSRF) 0 0 A6-Security Misconfiguration 0 0 A7-Insecure Cryptographic Storage* 0 0 A8-Failure to Restrict URL Access 0 0 A9-Insufficient Transport Layer Protection 0 0 A10-Unvalidated Redirects and Forwards 19 16 * Project scan results do not include all relevant queries. Presets andor Filters should be changed to include all relevant standard queries.
  • 37. PAGE 37 OF 47 Scan Summary - MOIS(KISA) Secure Coding 2021 Category Issues Found Best Fix Locations MOIS(KISA) API misuse* 0 0 MOIS(KISA) Code error* 9 9 MOIS(KISA) Encapsulation* 1 1 MOIS(KISA) Error processing* 194 194 MOIS(KISA) Security Functions* 221 128 MOIS(KISA) Time and status 0 0 MOIS(KISA) Verification and representation of input data* 409 232 * Project scan results do not include all relevant queries. Presets andor Filters should be changed to include all relevant standard queries.
  • 38. PAGE 38 OF 47 Scan Summary - SANS top 25 Category Issues Found Best Fix Locations SANS top 25* 528 333 * Project scan results do not include all relevant queries. Presets andor Filters should be changed to include all relevant standard queries.
  • 39. PAGE 39 OF 47 Scan Summary - CWE top 25 Category Issues Found Best Fix Locations CWE top 25* 532 337 * Project scan results do not include all relevant queries. Presets andor Filters should be changed to include all relevant standard queries.
  • 40. PAGE 40 OF 47 Scan Summary - Top Tier Category Issues Found Best Fix Locations Top Tier 28 17
  • 41. PAGE 41 OF 47 Scan Summary - OWASP ASVS Category Issues Found Best Fix Locations V01 Architecture, Design and Threat Modeling* 231 231 V02 Authentication* 28 28 V03 Session Management 66 40 V04 Access Control 11 11 V05 Validation, Sanitization and Encoding* 264 112 V06 Stored Cryptography* 38 38 V07 Error Handling and Logging* 2872 973 V08 Data Protection 46 46 V09 Communication 1 1 V10 Malicious Code* 109 16 V11 Business Logic* 0 0 V12 Files and Resources* 6 5 V13 API and Web Service* 139 115 V14 Configuration 204 204 * Project scan results do not include all relevant queries. Presets andor Filters should be changed to include all relevant standard queries.
  • 42. PAGE 42 OF 47 Scan Summary - ASA Mobile Premium Category Issues Found Best Fix Locations ASA Mobile Premium* 0 0 * Project scan results do not include all relevant queries. Presets andor Filters should be changed to include all relevant standard queries.
  • 43. PAGE 43 OF 47 Scan Summary - ASA Premium Category Issues Found Best Fix Locations ASA Premium* 2919 775 * Project scan results do not include all relevant queries. Presets andor Filters should be changed to include all relevant standard queries.
  • 44. PAGE 44 OF 47 Results Distribution By Status Compared to project scan from 7/30/2024 7:42 AM High Medium Low Information Total New Issues 1 1 25 0 27 Recurrent Issues 31 403 2,884 775 4,093 Total 32 404 2,909 775 4,120 Fixed Issues 50 74 54 0 178 New Scan Previous Scan Results Distribution By State High Medium Low Information Total To Verify 31 404 2,909 775 4,119 Not Exploitable 1 0 0 0 1 Confirmed 0 0 0 0 0 Urgent 0 0 0 0 0 Proposed Not Exploitable 0 0 0 0 0 Total 32 404 2,909 775 4,120 Result Summary Vulnerability Type Occurrences Severity Client DOM XSS 14 High Reflected XSS All Clients 13 High Prototype Pollution 4 High Client DOM Stored XSS 1 High CSRF 109 Medium Privacy Violation 109 Medium Client Potential XSS 94 Medium
  • 45. PAGE 45 OF 47 Excessive Data Exposure 32 Medium HttpOnlyCookies 20 Medium SSRF 15 Medium Path Traversal 4 Medium Client Potential Code Injection 3 Medium Insecure Cookie 3 Medium Missing Column Encryption 3 Medium Value Shadowing 3 Medium Cookie Injection 2 Medium No Request Validation 2 Medium Missing HSTS Header 1 Medium MVC View Injection 1 Medium RequireSSL 1 Medium Server DoS by loop 1 Medium SSL Verification Bypass 1 Medium Log Forging 2114 Low Client JQuery Deprecated Symbols 229 Low Improper Exception Handling 181 Low Open Redirect 89 Low Information Exposure via Headers 34 Low Unencrypted Web Config File 34 Low JavaScript Hijacking 30 Low URL Canonicalization Issue 30 Low Use Of Hardcoded Password 27 Low Unsafe Use Of Target blank 25 Low Client DOM Open Redirect 19 Low Client Hardcoded Domain 19 Low Information Exposure Through an Error Message 13 Low Missing Function Level Authorization 11 Low Unprotected Cookie 10 Low Heap Inspection 9 Low Improper Resource Shutdown or Release 9 Low Missing X Frame Options 6 Low Client Use Of Iframe Without Sandbox 5 Low Improper Transaction Handling 5 Low Potential Clickjacking on Legacy Browsers 2 Low Potential ReDoS 2 Low DebugEnabled 1 Low Missing Content Security Policy 1 Low Missing CSP Header 1 Low Overly Permissive Cross Origin Resource Sharing Policy 1 Low Use Of Broken Or Risky Cryptographic Algorithm 1 Low Use of Insufficiently Random Values 1 Low Insufficient Logging of Sensitive Operations 758 Information Hardcoded Absolute Path 9 Information Routed Deprecated Code 6 Information Suspicious Endpoints 2 Information 10 Most Vulnerable Files High and Medium Vulnerabilities
  • 46. PAGE 46 OF 47 File Name Issues Found Monotype.WhiteLabelCatalog.Web.Enterprise/Areas/Management/Contr ollers/AuthenticationManagerController.cs 109 Monotype.WhiteLabelCatalog.Services/CachingService/RedisCacheServi ce.cs 70 Monotype.WhiteLabelCatalog.Services/AuthenticationManagerService.c s 68 Monotype.WhiteLabelCatalog.Services/CachingService/CachingServiceB ase.cs 45 Monotype.WhiteLabelCatalog.Web.Enterprise/Scripts/modules/listapi.js 33 Monotype.WhiteLabelCatalog.Web.Enterprise/Scripts/modules/users.js 29 Monotype.WhiteLabelCatalog.Web.Enterprise/Controllers/CompanyCont roller.cs 27 Monotype.WhiteLabelCatalog.Services/CustomerManagementService/C ustomerAuthprovidersService.cs 26 Monotype.WhiteLabelCatalog.Services/Helper.cs 24 Monotype.WhiteLabelCatalog.Services/CustomerHierarchyService.cs 24
  • 47. PAGE 47 OF 47 Scanned Languages Language Hash Number Change Date CSharp 0200160583847316 7/19/2023 JavaScript 5693733879119650 7/19/2023 VbScript 0386000544005133 11/24/2022 PLSQL 0342189457118079 7/19/2023 Common 1330881790325397 7/19/2023