The application must perform verification of the correct operation of security functions: upon system startup and/or restart; upon command by a user with privileged access; and/or every 30 days.

From Application Security and Development Security Technical Implementation Guide

Part of SRG-APP-000473

Associated with: CCI-002699

SV-84907r1_rule The application must perform verification of the correct operation of security functions: upon system startup and/or restart; upon command by a user with privileged access; and/or every 30 days.

Vulnerability discussion

Without verification, security functions may not operate correctly and this failure may go unnoticed.Security function is defined as the hardware, software, and/or firmware of the information system responsible for enforcing the system security policy and supporting the isolation of code and data on which the protection is based. Security functionality includes, but is not limited to, establishing system accounts, configuring access authorizations (i.e., permissions, privileges), setting events to be audited, and setting intrusion detection parameters.Notifications provided by information systems include, for example, electronic alerts to system administrators, messages to local computer consoles, and/or hardware indications, such as lights.This requirement applies to applications performing security functions and the applications performing security function verification/testing.

Check content

Review the application documentation and interview the system administrator to determine if the application performs security function testing. If the application is not designed or intended to perform security function testing, the requirement is not applicable. Access the application design documents or have the system administrator provide proof if the application is designed to verify the correct operation of security functions. Review application logs and take note of log entries that indicate security function testing is being performed and verified on startup, restart, or on command by an authorized user. If the application is designed to perform security function testing and does not verify the correct operation of security functions on startup, restart, or upon command by a privileged user, this is a finding.

Fix text

Design the application to verify the correct operation of security functions on command and on application startup and restart.

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer