The DataPower Gateway must prohibit the use of cached authenticators after an organization-defined time period.

From IBM DataPower ALG Security Technical Implementation Guide

Part of SRG-NET-000344-ALG-000098

Associated with: CCI-002007

SV-79753r1_rule The DataPower Gateway must prohibit the use of cached authenticators after an organization-defined time period.

Vulnerability discussion

If the cached authenticator information is out of date, the validity of the authentication information may be questionable.This requirement applies to all ALGs which may cache user authenticators for use throughout a session. This requirement also applies to ALGs that provide user authentication intermediary services (e.g., authentication gateway or TLS gateway). This does not apply to authentication for the purpose of configuring the device itself (device management).

Check content

Search Bar “AAA Policy” >> Select AAA Policy. If no AAA Policy is present, this is a finding. Search Bar “AAA Policy” >> Select AAA Policy >> AAA policy >> Authentication. If cache authentication results “Disabled”, this is a finding. Search Bar “Processing Policy” >> processing policy >> Policy Maps tab processing rule >> Rule Action. If no AAA action exists, this is a finding.

Fix text

Search Bar “AAA Policy” >> Select AAA Policy >> AAA policy >> Authentication >> Cache authentication results “Absolute” or “Maximum” or “Minimum” >> Cache Lifetime cache value. Search Bar “Processing Policy” >> processing policy >> Policy Maps tab processing rule >> Processing Rule processing rule >> Rule Action AAA policy

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer