SC-23: Session Authenticity
CSF v1.1 References:
PF v1.0 References:
- NIST Special Publication 800-53 Revision 4:
- SC-23: Session Authenticity
Protect the authenticity of communications sessions.
Protecting session authenticity addresses communications protection at the session level, not at the packet level. Such protection establishes grounds for confidence at both ends of communications sessions in the ongoing identities of other parties and the validity of transmitted information. Authenticity protection includes protecting against "man-in-the-middle" attacks, session hijacking, and the insertion of false information into sessions.
SC-23(1): Invalidate Session Identifiers at Logout
Invalidate session identifiers upon user logout or other session termination.
SC-23(3): Unique System-generated Session Identifiers
Generate a unique session identifier for each session with [Assignment: organization-defined randomness requirements] and recognize only session identifiers that are system-generated.
SC-23(5): Allowed Certificate Authorities
Only allow the use of [Assignment: organization-defined certificate authorities] for verification of the establishment of protected sessions.