Free DISA STIG and SRG Library | Vaulted

V-69285

The application must ensure encrypted assertions, or equivalent confidentiality protections are used when assertion data is passed through an intermediary, and confidentiality of the assertion data is required when passing through the intermediary.

Finding ID
APSC-DV-000220
Rule ID
SV-83907r1_rule
Severity
Cat II
CCE
(None)
Group Title
SRG-APP-000014
CCI
CCI-000068
Target Key
(None)
Documentable
No
Discussion

SAML is a standard for exchanging authentication and authorization data between security domains. SAML uses security tokens containing assertions to pass information about a principal (usually an end user) between a SAML authority, (identity provider), and a SAML consumer, (service provider). SAML assertions are usually made about a subject, (user) represented by the &lt;<Subject> element. The confidentially of the data in a message as the message is passed through an intermediary web service may be required to be restricted by the intermediary web service. The intermediary web service may leak or distribute the data contained in a message if not encrypted or protected.

Fix Text

Encrypt assertions or use equivalent confidentiality when sensitive assertion data is passed through an intermediary.

Check Content

Ask the application representative for the design document. Review the design document for web services using WS-Security tokens. If the application does not utilize WS-Security tokens, this check is not applicable. Verify all WS-Security tokens are transmitted via an approved encryption method. If the design document does not exist, or does not indicate all WS-Security tokens are only transmitted via an approved encryption method, this is a finding.