The web server must uniquely identify and authenticate source by organization, system, application, and/or individual for information transfer.

STIG ID: SRG-APP-000334-WSR-000024  |  SRG: SRG-APP-000334 |  Severity: medium (CAT II)  |  CCI: CCI-002205,CCI-000366 |  Vulnerability Id: V-279028

Vulnerability Discussion

Attribution is a critical component of a security concept of operations. The ability to identify source and destination points for information flowing in information systems, allows the forensic reconstruction of events when required, and encourages policy compliance by attributing policy violations to specific organizations/individuals. Successful domain authentication requires that information system labels distinguish among systems, organizations, and individuals involved in preparing, sending, receiving, or disseminating information.

This requirement applies to applications that transfer information between different security domains (e.g., multilevel security).

This requirement also applies to Zero Trust initiatives.

Check

Verify that the web server is configured to uniquely identify and authenticate source by organization, system, application, and/or individual for information transfer.

If the web server does not uniquely identify and authenticate source by organization, system, application, and/or individual for information transfer, this is a finding.

Fix

Configure the web server to uniquely identify and authenticate source by organization, system, application, and/or individual for information transfer.