Ensure the safety, reliability, and security of U.S. Department of Defense information systems

The Security Technical Implementation Guides (STIGs) are security configuration guidelines and hardening frameworks provided by the U.S. Department of Defense’s (DoD’s) Defense Information Systems Agency (DISA). To date, DISA has issued more than 450 STIGs, and one of them focuses on application security. This Application Security and Development (ASD) STIG is derived from National Institute of Standards and Technology’s (NIST) 800-53 and related documents, and it defines the guidelines for use throughout the application development life cycle. This STIG provides guidance to promote the development, integration, and updating of secure applications.

DISA application security and development STIG-supported checkers

STIG ID Description Checker names

APSC-DV-000060

The application must clear temporary storage and cookies when the session is terminated.

SENSITIVE_DATA_LEAK, UNENCRYPTED_SENSITIVE_DATA

APSC-DV-000170

The application must implement cryptographic mechanisms to protect the integrity of remote access sessions.

CONFIG.SPRING_SECURITY_WEAK_PASSWORD_HASH, INSECURE_SALT, RAILS_DEVISE_CONFIG, RISKY_CRYPTO, SA.RISKY_CRYPTO, SIGMA.insecure_tls_cipher_suite_cloudformation_load_balancer, SIGMA.insecure_tls_version_ats_exception, SIGMA.insecure_tls_version_cloudformation_cloudfront, SIGMA.insecure_tls_version_cloudformation_elastic_search, SIGMA.insecure_tls_version_cloudformation_load_balancer, SIGMA.insecure_tls_version_ios_protocol_max, SIGMA.insecure_tls_version_ios_protocol_min, SIGMA.insecure_tls_version_ios_stream_property, SIGMA.insecure_tls_version_kafka, SIGMA.insecure_tls_version_terraform_azurerm_app_service, SIGMA.insecure_tls_version_terraform_azurerm_postgresql, SIGMA.insecure_tls_version_terraform_azurerm_storage_account, SIGMA.jwt_untrusted_decode_jsonwebtoken, SIGMA.jwt_untrusted_decode_kafka, SIGMA.missing_mtls_consul, SIGMA.missing_mtls_istio_port, SIGMA.missing_mtls_istio_service, SIGMA.missing_mtls_istio_workload, SIGMA.missing_mtls_kafka_broker, SIGMA.missing_mtls_rabbitmq, SIGMA.rsa_no_padding_core_java, SIGMA.unspecified_cipher_transformation_core_java, SIGMA.weak_password_hash_grails_springsecurity, WEAK_PASSWORD_HASH

APSC-DV-000500

The application must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.

CERT POS37-C, CERT SER08-J, CONFIG.MISSING_JSF2_SECURITY_CONSTRAINT, CONFIG.MYBATIS_MAPPER_SQLI, CONFIG.SPRING_SECURITY_DISABLE_AUTH_TAGS, CONFIG.STRUTS2_CONFIG_BROWSER_PLUGIN, INSECURE_DIRECT_OBJECT_REFERENCE, JSP_SQL_INJECTION, PMD.ApexSharingViolations, RAILS_DEFAULT_ROUTES, RAILS_MISSING_FILTER_ACTION, SIGMA.allow_all_authz_policy_istio, SIGMA.allow_all_authz_policy_terraform_aws_ecr, SIGMA.allow_all_authz_policy_terraform_google_big_query, SIGMA.allow_all_authz_policy_terraform_google_storage_bucket, SIGMA.anonymous_access_enabled_kubernetes, SIGMA.anonymous_access_enabled_rabbitmq_local, SIGMA.anonymous_access_enabled_rabbitmq_remote, SIGMA.default_allow_all_authz_policy_cloudformation_aws_webacl, SIGMA.default_allow_all_authz_policy_consul, SIGMA.default_allow_all_authz_policy_istio_envoy, SIGMA.default_allow_all_authz_policy_kafka, SIGMA.default_allow_all_authz_policy_openapi, SIGMA.http_method_missing_authz_openapi, SIGMA.http_method_missing_authz_terraform_aws_api_gateway, SIGMA.missing_servlet_mapping_servlet, SIGMA.remote_access_via_guest_account_rabbitmq_default_mqtt, SIGMA.remote_access_via_guest_account_rabbitmq_loopback_users, SIGMA.unprotected_admin_operation_openapi, SQLI, SQL_NOT_CONSTANT

APSC-DV-000510

The application must execute without excessive account permissions.

CERT SER08-J

APSC-DV-000530

The application must enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period.

RAILS_DEVISE_CONFIG, SIGMA.no_rate_limiting_openapi

APSC-DV-000580

The application must display the time and date of the users last successful logon.

INSUFFICIENT_LOGGING, SIGMA.logging_disabled_cloudformation_aws_s3_bucket, SIGMA.logging_disabled_consul, SIGMA.logging_disabled_istio, SIGMA.logging_disabled_kubernetes, SIGMA.logging_disabled_terraform_aws_load_balancer, SIGMA.logging_disabled_terraform_aws_s3_bucket, UNLOGGED_SECURITY_EXCEPTION

APSC-DV-000590

The application must protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation.

SIGMA.missing_mtls_consul, SIGMA.missing_mtls_istio_port, SIGMA.missing_mtls_istio_service, SIGMA.missing_mtls_istio_workload, SIGMA.missing_mtls_kafka_broker, SIGMA.missing_mtls_rabbitmq, SIGMA.password_change_without_old_password_openapi

APSC-DV-000650

The application must not write sensitive data into the application logs.

CONFIG.CORDOVA_EXCESSIVE_LOGGING, CONFIG.SPRING_BOOT_SENSITIVE_LOGGING, EXPRESS_WINSTON_SENSITIVE_LOGGING, SENSITIVE_DATA_LEAK, SIGMA.query_logging_enabled_sequelize

APSC-DV-000670

The application must record a time stamp indicating when the event occurred.

INSUFFICIENT_LOGGING, SIGMA.logging_disabled_cloudformation_aws_s3_bucket, SIGMA.logging_disabled_consul, SIGMA.logging_disabled_istio, SIGMA.logging_disabled_kubernetes, SIGMA.logging_disabled_terraform_aws_load_balancer, SIGMA.logging_disabled_terraform_aws_s3_bucket, UNLOGGED_SECURITY_EXCEPTION

APSC-DV-000700

The application must record the username or user ID of the user associated with the event.

INSUFFICIENT_LOGGING, SIGMA.logging_disabled_cloudformation_aws_s3_bucket, SIGMA.logging_disabled_consul, SIGMA.logging_disabled_istio, SIGMA.logging_disabled_kubernetes, SIGMA.logging_disabled_terraform_aws_load_balancer, SIGMA.logging_disabled_terraform_aws_s3_bucket, UNLOGGED_SECURITY_EXCEPTION

APSC-DV-000940

The application must log application shutdown events.

INSUFFICIENT_LOGGING, SIGMA.logging_disabled_cloudformation_aws_s3_bucket, SIGMA.logging_disabled_consul, SIGMA.logging_disabled_istio, SIGMA.logging_disabled_kubernetes, SIGMA.logging_disabled_terraform_aws_load_balancer, SIGMA.logging_disabled_terraform_aws_s3_bucket, UNLOGGED_SECURITY_EXCEPTION

APSC-DV-000950

The application must log destination IP addresses.

INSUFFICIENT_LOGGING, SIGMA.logging_disabled_cloudformation_aws_s3_bucket, SIGMA.logging_disabled_consul, SIGMA.logging_disabled_istio, SIGMA.logging_disabled_kubernetes, SIGMA.logging_disabled_terraform_aws_load_balancer, SIGMA.logging_disabled_terraform_aws_s3_bucket, UNLOGGED_SECURITY_EXCEPTION

APSC-DV-000960

The application must log user actions involving access to data.

INSUFFICIENT_LOGGING, SIGMA.logging_disabled_cloudformation_aws_s3_bucket, SIGMA.logging_disabled_consul, SIGMA.logging_disabled_istio, SIGMA.logging_disabled_kubernetes, SIGMA.logging_disabled_terraform_aws_load_balancer, SIGMA.logging_disabled_terraform_aws_s3_bucket, UNLOGGED_SECURITY_EXCEPTION

APSC-DV-000970

The application must log user actions involving changes to data.

INSUFFICIENT_LOGGING, SIGMA.logging_disabled_cloudformation_aws_s3_bucket, SIGMA.logging_disabled_consul, SIGMA.logging_disabled_istio, SIGMA.logging_disabled_kubernetes, SIGMA.logging_disabled_terraform_aws_load_balancer, SIGMA.logging_disabled_terraform_aws_s3_bucket, UNLOGGED_SECURITY_EXCEPTION

APSC-DV-001280

The application must protect audit information from any type of unauthorized read access.

HARDCODED_CREDENTIALS, LOCALSTORAGE_WRITE, SENSITIVE_DATA_LEAK, UNENCRYPTED_SENSITIVE_DATA, UNRESTRICTED_ACCESS_TO_FILE

APSC-DV-001290

The application must protect audit information from unauthorized modification.

HARDCODED_CREDENTIALS, LOCALSTORAGE_WRITE, SENSITIVE_DATA_LEAK, UNENCRYPTED_SENSITIVE_DATA, UNRESTRICTED_ACCESS_TO_FILE

APSC-DV-001300

The application must protect audit information from unauthorized deletion.

HARDCODED_CREDENTIALS, LOCALSTORAGE_WRITE, SENSITIVE_DATA_LEAK, UNENCRYPTED_SENSITIVE_DATA, UNRESTRICTED_ACCESS_TO_FILE

APSC-DV-001350

The application must use cryptographic mechanisms to protect the integrity of audit information.

AWS_SSL_DISABLED, CERT MSC00-J, CERT MSC18-C, CONFIG.SPRING_BOOT_SSL_DISABLED, CONFIG.SPRING_SECURITY_LOGIN_OVER_HTTP, DISABLED_ENCRYPTION, HAPI_SESSION_MONGO_MISSING_TLS, HARDCODED_CREDENTIALS, INSECURE_COMMUNICATION, INSECURE_COOKIE, INSECURE_REMEMBER_ME_COOKIE, PMD.ApexInsecureEndpoint, SENSITIVE_DATA_LEAK, SIGMA.api_key_in_query_string_openapi, SIGMA.cors_with_credentials_http_origin_openapi_x_a127, SIGMA.cors_with_credentials_http_origin_openapi_x_amazon_apigateway, SIGMA.cors_with_credentials_http_origin_openapi_x_amazon_apigateway_integration, SIGMA.cors_with_credentials_http_origin_terraform_azurerm_app_service, SIGMA.encryption_disabled_cloudformation_eks, SIGMA.encryption_disabled_ios_multipeer_connection, SIGMA.encryption_disabled_terraform_aws_eks, SIGMA.missing_secure_attribute_postman, SIGMA.missing_secure_attribute_remember_me_cookie_spring_security_config, SIGMA.missing_secure_attribute_session_cookie_grails, SIGMA.missing_tls_ats_arbitrary_loads, SIGMA.missing_tls_ats_arbitrary_loads_for_media, SIGMA.missing_tls_ats_arbitrary_loads_in_web_content, SIGMA.missing_tls_ats_domain_exception, SIGMA.missing_tls_ats_localhost_exception, SIGMA.missing_tls_ats_temporary_exception, SIGMA.missing_tls_ats_temporary_third_party_exception, SIGMA.missing_tls_ats_third_party_exception, SIGMA.missing_tls_cloudformation_cloudfront, SIGMA.missing_tls_cloudformation_doc_db, SIGMA.missing_tls_cloudformation_elastic_cache, SIGMA.missing_tls_cloudformation_elastic_search, SIGMA.missing_tls_cloudformation_elastic_search_node_to_node, SIGMA.missing_tls_cloudformation_load_balancer, SIGMA.missing_tls_cloudformation_load_balancer_classic, SIGMA.missing_tls_consul, SIGMA.missing_tls_consul_client, SIGMA.missing_tls_kafka_broker, SIGMA.missing_tls_kafka_client, SIGMA.missing_tls_kafka_listener, SIGMA.missing_tls_node_ftp, SIGMA.missing_tls_node_http, SIGMA.missing_tls_openapi_oauth2_endpoint, SIGMA.missing_tls_openapi_ref, SIGMA.missing_tls_openapi_v2_base_uri, SIGMA.missing_tls_openapi_v3_base_uri, SIGMA.missing_tls_openapi_x_a127, SIGMA.missing_tls_openapi_x_amazon_apigateway_integration, SIGMA.missing_tls_openapi_x_google_backend, SIGMA.missing_tls_openapi_x_google_jwks, SIGMA.missing_tls_openapi_x_servers, SIGMA.missing_tls_postman, SIGMA.missing_tls_sequelize, SIGMA.missing_tls_terraform_aws_cloudfront, SIGMA.missing_tls_terraform_aws_docdb, SIGMA.missing_tls_terraform_aws_load_balancer, SIGMA.missing_tls_terraform_azurerm_app_service, SIGMA.missing_tls_terraform_azurerm_mysql, SIGMA.missing_tls_terraform_azurerm_postgresql, SIGMA.missing_tls_terraform_azurerm_storage_account, SIGMA.missing_tls_terraform_google_sql_db, SIGMA.sasl_plain_enabled_kafka_broker, SIGMA.sasl_plain_enabled_kafka_client, SIGMA.sensitive_data_in_query_string_openapi, STRICT_TRANSPORT_SECURITY, UNENCRYPTED_SENSITIVE_DATA, UNSAFE_BASIC_AUTH, UNSAFE_SESSION_SETTING

APSC-DV-001360

Application audit tools must be cryptographically hashed.

INSECURE_SALT, RISKY_CRYPTO, WEAK_PASSWORD_HASH

APSC-DV-001370

The integrity of the audit tools must be validated by checking the files for changes in the cryptographic hash value.

INSECURE_SALT, RISKY_CRYPTO, WEAK_PASSWORD_HASH

APSC-DV-001650

The application must authenticate all network-connected endpoint devices before establishing any connection.

AWS_VALIDATION_DISABLED, BAD_CERT_VERIFICATION, CERT SEC06-J, CONFIG.MYSQL_SSL_VERIFY_DISABLED, CONFIG.SPRING_BOOT_SSL_DISABLED, CORS_MISCONFIGURATION, CORS_MISCONFIGURATION_AUDIT, HPKP_MISCONFIGURATION, RISKY_CRYPTO, SA.RISKY_CRYPTO, SIGMA.certificate_verification_disabled_ats_local_networking, SIGMA.certificate_verification_disabled_ats_transparency, SIGMA.certificate_verification_disabled_consul, SIGMA.certificate_verification_disabled_grails_springsecurity, SIGMA.certificate_verification_disabled_kubernetes, SIGMA.certificate_verification_disabled_node_request_strict_ssl, SIGMA.certificate_verification_disabled_openapi_x_amazon_apigateway_integration, SIGMA.missing_mtls_consul, SIGMA.missing_mtls_istio_port, SIGMA.missing_mtls_istio_service, SIGMA.missing_mtls_istio_workload, SIGMA.missing_mtls_kafka_broker, SIGMA.missing_mtls_rabbitmq, WEAK_GUARD

APSC-DV-001660

Service-oriented applications handling non-releasable data must authenticate endpoint devices via mutual SSL/TLS.

AWS_SSL_DISABLED, AWS_VALIDATION_DISABLED, BAD_CERT_VERIFICATION, CERT MSC18-C, CERT SEC06-J, CONFIG.MYSQL_SSL_VERIFY_DISABLED, CONFIG.SPRING_BOOT_SSL_DISABLED, CONFIG.SPRING_SECURITY_LOGIN_OVER_HTTP, CORS_MISCONFIGURATION, CORS_MISCONFIGURATION_AUDIT, DISABLED_ENCRYPTION, HAPI_SESSION_MONGO_MISSING_TLS, HPKP_MISCONFIGURATION, INSECURE_COMMUNICATION, PMD.ApexInsecureEndpoint, RISKY_CRYPTO, SA.RISKY_CRYPTO, SENSITIVE_DATA_LEAK, SIGMA.api_key_in_query_string_openapi, SIGMA.certificate_verification_disabled_ats_local_networking, SIGMA.certificate_verification_disabled_ats_transparency, SIGMA.certificate_verification_disabled_consul, SIGMA.certificate_verification_disabled_grails_springsecurity, SIGMA.certificate_verification_disabled_kubernetes, SIGMA.certificate_verification_disabled_node_request_strict_ssl, SIGMA.certificate_verification_disabled_openapi_x_amazon_apigateway_integration, SIGMA.cors_with_credentials_http_origin_openapi_x_a127, SIGMA.cors_with_credentials_http_origin_openapi_x_amazon_apigateway, SIGMA.cors_with_credentials_http_origin_openapi_x_amazon_apigateway_integration, SIGMA.cors_with_credentials_http_origin_terraform_azurerm_app_service, SIGMA.missing_tls_ats_arbitrary_loads, SIGMA.missing_tls_ats_arbitrary_loads_for_media, SIGMA.missing_tls_ats_arbitrary_loads_in_web_content, SIGMA.missing_tls_ats_domain_exception, SIGMA.missing_tls_ats_localhost_exception, SIGMA.missing_tls_ats_temporary_exception, SIGMA.missing_tls_ats_temporary_third_party_exception, SIGMA.missing_tls_ats_third_party_exception, SIGMA.missing_tls_cloudformation_cloudfront, SIGMA.missing_tls_cloudformation_doc_db, SIGMA.missing_tls_cloudformation_elastic_cache, SIGMA.missing_tls_cloudformation_elastic_search, SIGMA.missing_tls_cloudformation_elastic_search_node_to_node, SIGMA.missing_tls_cloudformation_load_balancer, SIGMA.missing_tls_cloudformation_load_balancer_classic, SIGMA.missing_tls_consul, SIGMA.missing_tls_consul_client, SIGMA.missing_tls_kafka_broker, SIGMA.missing_tls_kafka_client, SIGMA.missing_tls_kafka_listener, SIGMA.missing_tls_node_ftp, SIGMA.missing_tls_node_http, SIGMA.missing_tls_openapi_oauth2_endpoint, SIGMA.missing_tls_openapi_ref, SIGMA.missing_tls_openapi_v2_base_uri, SIGMA.missing_tls_openapi_v3_base_uri, SIGMA.missing_tls_openapi_x_a127, SIGMA.missing_tls_openapi_x_amazon_apigateway_integration, SIGMA.missing_tls_openapi_x_google_backend, SIGMA.missing_tls_openapi_x_google_jwks, SIGMA.missing_tls_openapi_x_servers, SIGMA.missing_tls_postman, SIGMA.missing_tls_sequelize, SIGMA.missing_tls_terraform_aws_cloudfront, SIGMA.missing_tls_terraform_aws_docdb, SIGMA.missing_tls_terraform_aws_load_balancer, SIGMA.missing_tls_terraform_azurerm_app_service, SIGMA.missing_tls_terraform_azurerm_mysql, SIGMA.missing_tls_terraform_azurerm_postgresql, SIGMA.missing_tls_terraform_azurerm_storage_account, SIGMA.missing_tls_terraform_google_sql_db, SIGMA.sasl_plain_enabled_kafka_broker, SIGMA.sasl_plain_enabled_kafka_client, STRICT_TRANSPORT_SECURITY, UNENCRYPTED_SENSITIVE_DATA, UNSAFE_BASIC_AUTH

APSC-DV-001680

The application must enforce a minimum 15-character password length.

MISSING_PASSWORD_VALIDATOR, RAILS_DEVISE_CONFIG, SIGMA.empty_password_core_java_sql

APSC-DV-001690

The application must enforce password complexity by requiring that at least one uppercase character be used.

MISSING_PASSWORD_VALIDATOR, RAILS_DEVISE_CONFIG, SIGMA.empty_password_core_java_sql

APSC-DV-001700

The application must enforce password complexity by requiring that at least one lowercase character be used.

MISSING_PASSWORD_VALIDATOR, RAILS_DEVISE_CONFIG, SIGMA.empty_password_core_java_sql

APSC-DV-001710

The application must enforce password complexity by requiring that at least one numeric character be used.

MISSING_PASSWORD_VALIDATOR, RAILS_DEVISE_CONFIG, SIGMA.empty_password_core_java_sql

APSC-DV-001720

The application must enforce password complexity by requiring that at least one special character be used.

MISSING_PASSWORD_VALIDATOR, RAILS_DEVISE_CONFIG, SIGMA.empty_password_core_java_sql

APSC-DV-001740

The application must only store cryptographic representations of passwords.

CONFIG.CONNECTION_STRING_PASSWORD, CONFIG.HARDCODED_CREDENTIALS_AUDIT, CONFIG.HARDCODED_TOKEN, CONFIG.SPRING_SECURITY_WEAK_PASSWORD_HASH, FB.DMI_CONSTANT_DB_PASSWORD, FB.DMI_EMPTY_DB_PASSWORD, HARDCODED_CREDENTIALS, INSECURE_SALT, PMD.ApexSuggestUsingNamedCred, RAILS_DEVISE_CONFIG, SENSITIVE_DATA_LEAK, SIGMA.empty_password_core_java_sql, SIGMA.hardcoded_secret_cloudformation, SIGMA.hardcoded_secret_kubernetes, SIGMA.hardcoded_secret_postman, SIGMA.hardcoded_secret_rabbitmq, SIGMA.hardcoded_secret_terraform, SIGMA.weak_password_hash_grails_springsecurity, UNENCRYPTED_SENSITIVE_DATA, WEAK_PASSWORD_HASH

APSC-DV-001750

The application must transmit only cryptographically protected passwords.

AWS_SSL_DISABLED, INSECURE_COMMUNICATION, SENSITIVE_DATA_LEAK, STRICT_TRANSPORT_SECURITY, UNENCRYPTED_SENSITIVE_DATA

APSC-DV-001770

The application must enforce a 60-day maximum password lifetime restriction.

RAILS_DEVISE_CONFIG

APSC-DV-001795

The application password must not be changeable by users other than the administrator or the user with which the password is associated.

CERT MSC03-J, CONFIG.CONNECTION_STRING_PASSWORD, CONFIG.HARDCODED_CREDENTIALS_AUDIT, CONFIG.HARDCODED_TOKEN, CONFIG.SPRING_SECURITY_HARDCODED_CREDENTIALS, FB.DMI_CONSTANT_DB_PASSWORD, FB.DMI_EMPTY_DB_PASSWORD, HARDCODED_CREDENTIALS, PMD.ApexBadCrypto, PMD.ApexSuggestUsingNamedCred, SIGMA.hardcoded_credential_core_swift, SIGMA.hardcoded_remember_me_key_spring_security, SIGMA.password_change_without_old_password_openapi, UNSAFE_BASIC_AUTH, UNSAFE_SESSION_SETTING

APSC-DV-001810

The application, when utilizing PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.

AWS_VALIDATION_DISABLED, BAD_CERT_VERIFICATION, CONFIG.MYSQL_SSL_VERIFY_DISABLED, CONFIG.SPRING_BOOT_SSL_DISABLED, HPKP_MISCONFIGURATION, SIGMA.certificate_verification_disabled_ats_local_networking, SIGMA.certificate_verification_disabled_ats_transparency, SIGMA.certificate_verification_disabled_consul, SIGMA.certificate_verification_disabled_grails_springsecurity, SIGMA.certificate_verification_disabled_kubernetes, SIGMA.certificate_verification_disabled_node_request_strict_ssl, SIGMA.certificate_verification_disabled_openapi_x_amazon_apigateway_integration

APSC-DV-001820

The application, when using PKI-based authentication, must enforce authorized access to the corresponding private key.

HARDCODED_CREDENTIALS, PMD.ApexBadCrypto, SIGMA.missing_mtls_consul, SIGMA.missing_mtls_istio_port, SIGMA.missing_mtls_istio_service, SIGMA.missing_mtls_istio_workload, SIGMA.missing_mtls_kafka_broker, SIGMA.missing_mtls_rabbitmq, UNSAFE_SESSION_SETTING

APSC-DV-001830

The application must map the authenticated identity to the individual user or group account for PKI-based authentication.

BAD_CERT_VERIFICATION

APSC-DV-001840

The application, for PKI-based authentication, must implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.

BAD_CERT_VERIFICATION

APSC-DV-001995

The application must not be vulnerable to race conditions.

ATOMICITY, BAD_CHECK_OF_WAIT_COND, BAD_LOCK_OBJECT, CERT CON31-C, CERT CON35-C, CERT CON40-C, CERT CON50-CPP, CERT CON51-CPP, CERT CON53-CPP, CERT CON56-CPP, CERT FIO45-C, CERT LCK00-J, CERT LCK01-J, CERT LCK02-J, CERT LCK03-J, CERT LCK06-J, CERT LCK08-J, CERT MET01-J, CERT MSC07-J, CERT POS35-C, CERT POS52-C, CERT SIG30-C, DC.DEADLOCK, FB.DC_DOUBLECHECK, FB.DC_PARTIALLY_CONSTRUCTED, FB.IS2_INCONSISTENT_SYNC, FB.IS_FIELD_NOT_GUARDED, FB.IS_INCONSISTENT_SYNC, FB.LI_LAZY_INIT_STATIC, FB.LI_LAZY_INIT_UPDATE_STATIC, FB.RU_INVOKE_RUN, FB.STCAL_INVOKE_ON_STATIC_CALENDAR_INSTANCE, FB.STCAL_INVOKE_ON_STATIC_DATE_FORMAT_INSTANCE, FB.STCAL_STATIC_CALENDAR_INSTANCE, FB.STCAL_STATIC_SIMPLE_DATE_FORMAT_INSTANCE, GUARDED_BY_VIOLATION, LOCK, LOCK_EVASION, LOCK_INVERSION, MISSING_LOCK, NON_STATIC_GUARDING_STATIC, ORDER_REVERSAL, SERVLET_ATOMICITY, SINGLETON_RACE, SLEEP, TOCTOU, VOLATILE_ATOMICITY

APSC-DV-002000

The application must terminate all network connections associated with a communications session at the end of the session.

CONFIG.UNSAFE_SESSION_TIMEOUT, CORS_MISCONFIGURATION_AUDIT, HPKP_MISCONFIGURATION, INSUFFICIENT_PRESIGNED_URL_TIMEOUT, SIGMA.cache_ttl_too_long_openapi_x_a127, SIGMA.excessive_token_lifetime_terraform_auth0, SIGMA.jwt_ignored_expiration_time_hapi, SIGMA.jwt_ignored_expiration_time_jsonwebtoken, SIGMA.jwt_ignored_start_time_hapi, SIGMA.jwt_ignored_start_time_jsonwebtoken, SIGMA.jwt_non_expiring_token_jsonwebtoken, SIGMA.token_ttl_too_long_openapi_x_a127, TEMPORARY_CREDENTIALS_DURATION

APSC-DV-002210

The application must set the HTTPOnly flag on session cookies.

CONFIG.JAVAEE_MISSING_HTTPONLY

APSC-DV-002220

The application must set the secure flag on session cookies.

INSECURE_COOKIE, INSECURE_REMEMBER_ME_COOKIE, SIGMA.missing_secure_attribute_postman, SIGMA.missing_secure_attribute_remember_me_cookie_spring_security_config, SIGMA.missing_secure_attribute_session_cookie_grails, UNSAFE_SESSION_SETTING

APSC-DV-002230

The application must not expose session IDs.

CONFIG.SPRING_SECURITY_SESSION_FIXATION, SESSION_FIXATION

APSC-DV-002240

The application must destroy the session ID value and/or cookie on logoff or browser close.

CONFIG.UNSAFE_SESSION_TIMEOUT, CORS_MISCONFIGURATION_AUDIT, HPKP_MISCONFIGURATION, INSUFFICIENT_PRESIGNED_URL_TIMEOUT, SENSITIVE_DATA_LEAK, SIGMA.cache_ttl_too_long_openapi_x_a127, SIGMA.excessive_token_lifetime_terraform_auth0, SIGMA.jwt_ignored_expiration_time_hapi, SIGMA.jwt_ignored_expiration_time_jsonwebtoken, SIGMA.jwt_ignored_start_time_hapi, SIGMA.jwt_ignored_start_time_jsonwebtoken, SIGMA.jwt_non_expiring_token_jsonwebtoken, SIGMA.token_ttl_too_long_openapi_x_a127, TEMPORARY_CREDENTIALS_DURATION, UNENCRYPTED_SENSITIVE_DATA

APSC-DV-002250

Applications must use system-generated session identifiers that protect against session fixation.

CONFIG.SPRING_SECURITY_SESSION_FIXATION, SESSION_FIXATION

APSC-DV-002260

Applications must validate session identifiers.

CONFIG.COOKIE_SIGNING_DISABLED

APSC-DV-002280

The application must not reuse or recycle session IDs.

CONFIG.UNSAFE_SESSION_TIMEOUT, CORS_MISCONFIGURATION_AUDIT, HPKP_MISCONFIGURATION, INSUFFICIENT_PRESIGNED_URL_TIMEOUT, SIGMA.cache_ttl_too_long_openapi_x_a127, SIGMA.excessive_token_lifetime_terraform_auth0, SIGMA.jwt_ignored_expiration_time_hapi, SIGMA.jwt_ignored_expiration_time_jsonwebtoken, SIGMA.jwt_ignored_start_time_hapi, SIGMA.jwt_ignored_start_time_jsonwebtoken, SIGMA.jwt_non_expiring_token_jsonwebtoken, SIGMA.token_ttl_too_long_openapi_x_a127, TEMPORARY_CREDENTIALS_DURATION

APSC-DV-002300

The application must only allow the use of DoD-approved certificate authorities for verification of the establishment of protected sessions.

AWS_VALIDATION_DISABLED, BAD_CERT_VERIFICATION, CONFIG.MYSQL_SSL_VERIFY_DISABLED, CONFIG.SPRING_BOOT_SSL_DISABLED, HPKP_MISCONFIGURATION, SIGMA.certificate_verification_disabled_ats_local_networking, SIGMA.certificate_verification_disabled_ats_transparency, SIGMA.certificate_verification_disabled_consul, SIGMA.certificate_verification_disabled_grails_springsecurity, SIGMA.certificate_verification_disabled_kubernetes, SIGMA.certificate_verification_disabled_node_request_strict_ssl, SIGMA.certificate_verification_disabled_openapi_x_amazon_apigateway_integration

APSC-DV-002370

The application must maintain a separate execution domain for each executing process.

ARRAY_VS_SINGLETON, AUTOSAR C++14 A3-8-1, AUTOSAR C++14 M0-2-1, AUTOSAR C++14 M5-0-16, AUTOSAR C++14 M5-0-17, AUTOSAR C++14 M7-5-2, BAD_ALLOC_ARITHMETIC, BUFFER_SIZE, CERT ARR30-C, CERT ARR38-C, CERT CTR50-CPP, CERT ENV01-C, CERT EXP39-C, CERT EXP54-CPP, CERT INT04-C, CERT MEM30-C, CERT MEM50-CPP, CERT STR31-C, CERT STR50-CPP, COM.BAD_FREE, COM.BSTR.ALLOC, COM.BSTR.CONV, INCOMPATIBLE_CAST, INTEGER_OVERFLOW, INVALIDATE_ITERATOR, MISMATCHED_ITERATOR, MISRA C++-2008 Rule 0-2-1, MISRA C++-2008 Rule 5-0-16, MISRA C++-2008 Rule 5-0-17, MISRA C++-2008 Rule 7-5-2, MISRA C-2004 Rule 17.1, MISRA C-2004 Rule 17.2, MISRA C-2004 Rule 17.3, MISRA C-2004 Rule 17.6, MISRA C-2004 Rule 18.2, MISRA C-2004 Rule 5.5, MISRA C-2012 Rule 18.1, MISRA C-2012 Rule 18.2, MISRA C-2012 Rule 18.6, MISRA C-2012 Rule 19.1, MISRA C-2012 Rule 21.17, MISRA C-2012 Rule 22.6, MISSING_COPY_OR_ASSIGN, OVERRUN, REVERSE_NEGATIVE, SIZECHECK, STRING_OVERFLOW, STRING_SIZE, TAINTED_SCALAR, UNSAFE_FUNCTIONALITY, USE_AFTER_FREE, WRAPPER_ESCAPE

APSC-DV-002380

Applications must prevent unauthorized and unintended information transfer via shared system resources.

SENSITIVE_DATA_LEAK

APSC-DV-002390

XML-based applications must mitigate DoS attacks by using XML filters, parser options, or gateways.

UNSAFE_XML_PARSE_CONFIG, WEAK_XML_SCHEMA, XML_EXTERNAL_ENTITY, XML_INJECTION, XPATH_INJECTION

APSC-DV-002400

The application must restrict the ability to launch denial of service (DoS) attacks against itself or other information systems.

AUTOSAR C++14 A12-4-1, AUTOSAR C++14 A15-1-4, AUTOSAR C++14 A3-8-1, AUTOSAR C++14 M0-2-1, AUTOSAR C++14 M7-5-2, BUSBOY_MISCONFIGURATION, CERT EXP54-CPP, CERT FIO30-C, CERT FIO32-C, CERT MEM05-C, CERT MEM30-C, CERT MEM50-CPP, CERT MET01-J, CERT MET02-J, CERT POS47-C, CERT SIG30-C, CERT SIG31-C, COM.ADDROF_LEAK, COM.BAD_FREE, COM.BSTR.ALLOC, CONFIG.CORDOVA_EXCESSIVE_LOGGING, CONFIG.DEAD_AUTHORIZATION_RULE, CONFIG.MISSING_JSF2_SECURITY_CONSTRAINT, CONFIG.MYBATIS_MAPPER_SQLI, CONFIG.SOCKETIO_MAXHTTPBUFFERSIZE_SET_TOO_LARGE, CONFIG.SPRING_SECURITY_DEBUG_MODE, CONFIG.SPRING_SECURITY_DISABLE_AUTH_TAGS, CONFIG.STRUTS2_CONFIG_BROWSER_PLUGIN, CONFIG.STRUTS2_DYNAMIC_METHOD_INVOCATION, CONFIG.STRUTS2_ENABLED_DEV_MODE, CTOR_DTOR_LEAK, EXPRESS_SESSION_UNSAFE_MEMORYSTORE, FB.DM_EXIT, FILE_UPLOAD_MISCONFIGURATION, FORMAT_STRING_INJECTION, HARDCODED_CREDENTIALS, IMPLICIT_INTENT, INSECURE_DIRECT_OBJECT_REFERENCE, JSP_SQL_INJECTION, LOCALSTORAGE_WRITE, LOCK, MISRA C++-2008 Rule 0-2-1, MISRA C++-2008 Rule 3-1-3, MISRA C++-2008 Rule 7-5-2, MISRA C-2004 Rule 17.6, MISRA C-2004 Rule 18.2, MISRA C-2004 Rule 5.5, MISRA C-2012 Rule 18.6, MISRA C-2012 Rule 19.1, MISRA C-2012 Rule 22.6, MISSING_COPY_OR_ASSIGN, MISSING_PERMISSION_FOR_BROADCAST, MULTER_MISCONFIGURATION, NEGATIVE_RETURNS, NO_EFFECT, PW.NON_CONST_PRINTF_FORMAT_STRING, RAILS_DEFAULT_ROUTES, RAILS_DEVISE_CONFIG, RAILS_MISSING_FILTER_ACTION, RESOURCE_LEAK, RUBY_VULNERABLE_LIBRARY, SENSITIVE_DATA_LEAK, SIGMA.allow_all_authz_policy_istio, SIGMA.allow_all_authz_policy_terraform_aws_ecr, SIGMA.allow_all_authz_policy_terraform_google_big_query, SIGMA.allow_all_authz_policy_terraform_google_storage_bucket, SIGMA.anonymous_access_enabled_kubernetes, SIGMA.anonymous_access_enabled_rabbitmq_local, SIGMA.anonymous_access_enabled_rabbitmq_remote, SIGMA.container_missing_cpu_limit_kubernetes, SIGMA.container_missing_memory_limit_kubernetes, SIGMA.dangerous_ropc_flow_openapi_v2, SIGMA.dangerous_ropc_flow_openapi_v3, SIGMA.dangerous_ropc_flow_openapi_x_a127, SIGMA.dangerous_ropc_flow_postman, SIGMA.dangerous_ropc_flow_terraform_auth0, SIGMA.default_allow_all_authz_policy_cloudformation_aws_webacl, SIGMA.default_allow_all_authz_policy_consul, SIGMA.default_allow_all_authz_policy_istio_envoy, SIGMA.default_allow_all_authz_policy_kafka, SIGMA.default_allow_all_authz_policy_openapi, SIGMA.file_upload_misconfiguration_filesize_graphql_js, SIGMA.file_upload_misconfiguration_max_files_graphql_js, SIGMA.file_upload_misconfiguration_of_fields_busboy, SIGMA.file_upload_misconfiguration_of_filesize_busboy, SIGMA.http_method_missing_authz_openapi, SIGMA.http_method_missing_authz_terraform_aws_api_gateway, SIGMA.missing_servlet_mapping_servlet, SIGMA.no_rate_limiting_openapi, SIGMA.oauth2_pkce_plaintext_challenge_postman, SIGMA.remote_access_via_guest_account_rabbitmq_default_mqtt, SIGMA.remote_access_via_guest_account_rabbitmq_loopback_users, SIGMA.undefined_oauth2_scope_openapi_v2, SIGMA.undefined_oauth2_scope_openapi_v3, SQLI, SQL_NOT_CONSTANT, STACK_USE, TAINTED_SCALAR, UNENCRYPTED_SENSITIVE_DATA, UNLIMITED_CONCURRENT_SESSIONS, UNRESTRICTED_ACCESS_TO_FILE, USE_AFTER_FREE, VIRTUAL_DTOR, WEAK_XML_SCHEMA, WRAPPER_ESCAPE, XML_EXTERNAL_ENTITY

APSC-DV-002440

The application must protect the confidentiality and integrity of transmitted information.

AWS_SSL_DISABLED, BAD_CERT_VERIFICATION, CERT MSC00-J, CERT MSC18-C, CERT SEC06-J, CONFIG.SPRING_BOOT_SSL_DISABLED, CONFIG.SPRING_SECURITY_LOGIN_OVER_HTTP, CORS_MISCONFIGURATION, CORS_MISCONFIGURATION_AUDIT, DISABLED_ENCRYPTION, HAPI_SESSION_MONGO_MISSING_TLS, HARDCODED_CREDENTIALS, INSECURE_COMMUNICATION, INSECURE_COOKIE, INSECURE_REMEMBER_ME_COOKIE, PMD.ApexInsecureEndpoint, RISKY_CRYPTO, SA.RISKY_CRYPTO, SENSITIVE_DATA_LEAK, SIGMA.api_key_in_query_string_openapi, SIGMA.cors_with_credentials_http_origin_openapi_x_a127, SIGMA.cors_with_credentials_http_origin_openapi_x_amazon_apigateway, SIGMA.cors_with_credentials_http_origin_openapi_x_amazon_apigateway_integration, SIGMA.cors_with_credentials_http_origin_terraform_azurerm_app_service, SIGMA.encryption_disabled_cloudformation_eks, SIGMA.encryption_disabled_ios_multipeer_connection, SIGMA.encryption_disabled_terraform_aws_eks, SIGMA.jwt_untrusted_decode_jsonwebtoken, SIGMA.jwt_untrusted_decode_kafka, SIGMA.missing_secure_attribute_postman, SIGMA.missing_secure_attribute_remember_me_cookie_spring_security_config, SIGMA.missing_secure_attribute_session_cookie_grails, SIGMA.missing_tls_ats_arbitrary_loads, SIGMA.missing_tls_ats_arbitrary_loads_for_media, SIGMA.missing_tls_ats_arbitrary_loads_in_web_content, SIGMA.missing_tls_ats_domain_exception, SIGMA.missing_tls_ats_localhost_exception, SIGMA.missing_tls_ats_temporary_exception, SIGMA.missing_tls_ats_temporary_third_party_exception, SIGMA.missing_tls_ats_third_party_exception, SIGMA.missing_tls_cloudformation_cloudfront, SIGMA.missing_tls_cloudformation_doc_db, SIGMA.missing_tls_cloudformation_elastic_cache, SIGMA.missing_tls_cloudformation_elastic_search, SIGMA.missing_tls_cloudformation_elastic_search_node_to_node, SIGMA.missing_tls_cloudformation_load_balancer, SIGMA.missing_tls_cloudformation_load_balancer_classic, SIGMA.missing_tls_consul, SIGMA.missing_tls_consul_client, SIGMA.missing_tls_kafka_broker, SIGMA.missing_tls_kafka_client, SIGMA.missing_tls_kafka_listener, SIGMA.missing_tls_node_ftp, SIGMA.missing_tls_node_http, SIGMA.missing_tls_openapi_oauth2_endpoint, SIGMA.missing_tls_openapi_ref, SIGMA.missing_tls_openapi_v2_base_uri, SIGMA.missing_tls_openapi_v3_base_uri, SIGMA.missing_tls_openapi_x_a127, SIGMA.missing_tls_openapi_x_amazon_apigateway_integration, SIGMA.missing_tls_openapi_x_google_backend, SIGMA.missing_tls_openapi_x_google_jwks, SIGMA.missing_tls_openapi_x_servers, SIGMA.missing_tls_postman, SIGMA.missing_tls_sequelize, SIGMA.missing_tls_terraform_aws_cloudfront, SIGMA.missing_tls_terraform_aws_docdb, SIGMA.missing_tls_terraform_aws_load_balancer, SIGMA.missing_tls_terraform_azurerm_app_service, SIGMA.missing_tls_terraform_azurerm_mysql, SIGMA.missing_tls_terraform_azurerm_postgresql, SIGMA.missing_tls_terraform_azurerm_storage_account, SIGMA.missing_tls_terraform_google_sql_db, SIGMA.sasl_plain_enabled_kafka_broker, SIGMA.sasl_plain_enabled_kafka_client, SIGMA.sensitive_data_in_query_string_openapi, STRICT_TRANSPORT_SECURITY, UNENCRYPTED_SENSITIVE_DATA, UNSAFE_BASIC_AUTH, UNSAFE_SESSION_SETTING

APSC-DV-002460

The application must maintain the confidentiality and integrity of information during preparation for transmission.

AWS_SSL_DISABLED, CERT MSC30-C, CERT SEC02-J, CONFIG.CONNECTION_STRING_PASSWORD, CONFIG.SPRING_BOOT_SSL_DISABLED, CONFIG.SPRING_SECURITY_EXPOSED_SESSIONID, CONFIG.SPRING_SECURITY_LOGIN_OVER_HTTP, CONFIG.SPRING_SECURITY_UNSAFE_AUTHENTICATION_FILTER, CONFIG.SPRING_SECURITY_WEAK_PASSWORD_HASH, CONFIG.WEAK_SECURITY_CONSTRAINT, CORS_MISCONFIGURATION, CORS_MISCONFIGURATION_AUDIT, DC.WEAK_CRYPTO, DISABLED_ENCRYPTION, FB.DMI_CONSTANT_DB_PASSWORD, FB.DMI_EMPTY_DB_PASSWORD, HARDCODED_CREDENTIALS, HPKP_MISCONFIGURATION, INSECURE_ACL, INSECURE_COMMUNICATION, INSECURE_NETWORK_BIND, INSECURE_RANDOM, INSECURE_REFERRER_POLICY, INSECURE_SALT, PMD.ApexSuggestUsingNamedCred, PREDICTABLE_RANDOM_SEED, RAILS_DEVISE_CONFIG, REVERSE_TABNABBING, RISKY_CRYPTO, SA.RISKY_CRYPTO, SECURE_TEMP, SENSITIVE_DATA_LEAK, SIGMA.insecure_tls_cipher_suite_cloudformation_load_balancer, SIGMA.insecure_tls_version_ats_exception, SIGMA.insecure_tls_version_cloudformation_cloudfront, SIGMA.insecure_tls_version_cloudformation_elastic_search, SIGMA.insecure_tls_version_cloudformation_load_balancer, SIGMA.insecure_tls_version_ios_protocol_max, SIGMA.insecure_tls_version_ios_protocol_min, SIGMA.insecure_tls_version_ios_stream_property, SIGMA.insecure_tls_version_kafka, SIGMA.insecure_tls_version_terraform_azurerm_app_service, SIGMA.insecure_tls_version_terraform_azurerm_postgresql, SIGMA.insecure_tls_version_terraform_azurerm_storage_account, SIGMA.rsa_no_padding_core_java, SIGMA.unspecified_cipher_transformation_core_java, UNENCRYPTED_SENSITIVE_DATA, UNSAFE_BASIC_AUTH, UNSAFE_BUFFER_METHOD, VERBOSE_ERROR_REPORTING, WEAK_GUARD, WEAK_PASSWORD_HASH, WEAK_URL_SANITIZATION

APSC-DV-002470

The application must maintain the confidentiality and integrity of information during reception.

AWS_SSL_DISABLED, BAD_CERT_VERIFICATION, CERT SEC06-J, CORS_MISCONFIGURATION, CORS_MISCONFIGURATION_AUDIT, INSECURE_COMMUNICATION, RISKY_CRYPTO, SA.RISKY_CRYPTO, SENSITIVE_DATA_LEAK, SIGMA.jwt_untrusted_decode_jsonwebtoken, SIGMA.jwt_untrusted_decode_kafka, STRICT_TRANSPORT_SECURITY, UNENCRYPTED_SENSITIVE_DATA

APSC-DV-002480

The application must not disclose unnecessary information to users.

ANDROID_CAPABILITY_LEAK, ANDROID_DEBUG_MODE, ASPNET_MVC_VERSION_HEADER, CONFIG.ANDROID_BACKUPS_ALLOWED, CONFIG.ASPNET_VERSION_HEADER, CONFIG.ASP_VIEWSTATE_MAC, CONFIG.CONNECTION_STRING_PASSWORD, CONFIG.DEAD_AUTHORIZATION_RULE, CONFIG.DYNAMIC_DATA_HTML_COMMENT, CONFIG.ENABLED_DEBUG_MODE, CONFIG.ENABLED_TRACE_MODE, CONFIG.MISSING_CUSTOM_ERROR_PAGE, CONFIG.MISSING_GLOBAL_EXCEPTION_HANDLER, CONFIG.MISSING_JSF2_SECURITY_CONSTRAINT, CONFIG.MYBATIS_MAPPER_SQLI, CONFIG.SPRING_BOOT_SENSITIVE_LOGGING, CONFIG.SPRING_SECURITY_DEBUG_MODE, CONFIG.SPRING_SECURITY_DISABLE_AUTH_TAGS, CONFIG.STRUTS2_CONFIG_BROWSER_PLUGIN, CONFIG.STRUTS2_DYNAMIC_METHOD_INVOCATION, CONFIG.STRUTS2_ENABLED_DEV_MODE, EXPOSED_DIRECTORY_LISTING, EXPOSED_PREFERENCES, EXPRESS_WINSTON_SENSITIVE_LOGGING, EXPRESS_X_POWERED_BY_ENABLED, IMPLICIT_INTENT, INSECURE_DIRECT_OBJECT_REFERENCE, JSP_SQL_INJECTION, MISSING_PERMISSION_FOR_BROADCAST, MISSING_PERMISSION_ON_EXPORTED_COMPONENT, MOBILE_ID_MISUSE, OPEN_REDIRECT, PMD.ApexOpenRedirect, RAILS_DEFAULT_ROUTES, RAILS_MISSING_FILTER_ACTION, REVERSE_TABNABBING, SENSITIVE_DATA_LEAK, SIGMA.allow_all_authz_policy_istio, SIGMA.allow_all_authz_policy_terraform_aws_ecr, SIGMA.allow_all_authz_policy_terraform_google_big_query, SIGMA.allow_all_authz_policy_terraform_google_storage_bucket, SIGMA.anonymous_access_enabled_kubernetes, SIGMA.anonymous_access_enabled_rabbitmq_local, SIGMA.anonymous_access_enabled_rabbitmq_remote, SIGMA.dangerous_ropc_flow_openapi_v2, SIGMA.dangerous_ropc_flow_openapi_v3, SIGMA.dangerous_ropc_flow_openapi_x_a127, SIGMA.dangerous_ropc_flow_postman, SIGMA.dangerous_ropc_flow_terraform_auth0, SIGMA.default_allow_all_authz_policy_cloudformation_aws_webacl, SIGMA.default_allow_all_authz_policy_consul, SIGMA.default_allow_all_authz_policy_istio_envoy, SIGMA.default_allow_all_authz_policy_kafka, SIGMA.default_allow_all_authz_policy_openapi, SIGMA.http_method_missing_authz_openapi, SIGMA.http_method_missing_authz_terraform_aws_api_gateway, SIGMA.missing_servlet_mapping_servlet, SIGMA.oauth2_pkce_plaintext_challenge_postman, SIGMA.query_logging_enabled_sequelize, SIGMA.remote_access_via_guest_account_rabbitmq_default_mqtt, SIGMA.remote_access_via_guest_account_rabbitmq_loopback_users, SIGMA.ssrf_with_untrusted_callback_param_openapi, SIGMA.ssrf_with_untrusted_callback_prop_openapi, SIGMA.undefined_oauth2_scope_openapi_v2, SIGMA.undefined_oauth2_scope_openapi_v3, SQLI, SQL_NOT_CONSTANT, UNENCRYPTED_SENSITIVE_DATA, UNRESTRICTED_ACCESS_TO_FILE, URL_MANIPULATION

APSC-DV-002485

The application must not store sensitive information in hidden fields.

SENSITIVE_DATA_LEAK

APSC-DV-002490

The application must protect from cross-site scripting (XSS) vulnerabilities.

ANGULAR_SCE_DISABLED, CONFIG.SPRING_SECURITY_DEPRECATED_XSS_HEADER, DOM_XSS, INSECURE_CSP, JINJA2_AUTOESCAPE_DISABLED, REACT_DANGEROUS_INNERHTML, VUE_TEMPLATE_UNSAFE_VHTML_DIRECTIVE, XSS

APSC-DV-002500

The application must protect from cross-site request forgery (CSRF) vulnerabilities.

CONFIG.BEEGO_CSRF_PROTECTION_DISABLED, CONFIG.CSURF_IGNORE_METHODS, CONFIG.DJANGO_CSRF_PROTECTION_DISABLED, CONFIG.HANA_XS_PREVENT_XSRF_DISABLED, CONFIG.SPRING_SECURITY_CSRF_PROTECTION_DISABLED, CONFIG.SYMFONY_CSRF_PROTECTION_DISABLED, CSRF, CSRF_MISCONFIGURATION_HAPI_CRUMB, PMD.VfCsrf, RUBY_VULNERABLE_LIBRARY, SIGMA.csrf_openapi

APSC-DV-002510

The application must protect from command injection.

CERT IDS07-J, OS_CMD_INJECTION, TAINTED_ENVIRONMENT_WITH_EXECUTION

APSC-DV-002520

The application must protect from canonical representation vulnerabilities.

BUSBOY_MISCONFIGURATION, CERT FIO32-C, FB.PT_ABSOLUTE_PATH_TRAVERSAL, FB.PT_RELATIVE_PATH_TRAVERSAL, FILE_UPLOAD_MISCONFIGURATION, JSP_DYNAMIC_INCLUDE, MULTER_MISCONFIGURATION, PATH_MANIPULATION, RUBY_VULNERABLE_LIBRARY

APSC-DV-002530

The application must validate all input.

ANGULAR_EXPRESSION_INJECTION, CERT ARR00-C, CERT CTR55-CPP, CERT FIO30-C, CERT SER01-J, CERT SER12-J, CERT STR53-CPP, CONFIG.UNSAFE_SESSION_TIMEOUT, COOKIE_SERIALIZER_CONFIG, CORS_MISCONFIGURATION_AUDIT, DISTRUSTED_DATA_DESERIALIZATION, FORMAT_STRING_INJECTION, HOST_HEADER_VALIDATION_DISABLED, HPKP_MISCONFIGURATION, INSUFFICIENT_PRESIGNED_URL_TIMEOUT, JAVA_CODE_INJECTION, JCR_INJECTION, JSP_DYNAMIC_INCLUDE, LDAP_INJECTION, LDAP_NOT_CONSTANT, NEGATIVE_RETURNS, NOSQL_QUERY_INJECTION, OGNL_INJECTION, PATH_MANIPULATION, PW.NON_CONST_PRINTF_FORMAT_STRING, REGEX_INJECTION, REVERSE_NEGATIVE, RUBY_VULNERABLE_LIBRARY, SCRIPT_CODE_INJECTION, SIGMA.cors_preflight_age_too_long_cloudformation_aws_s3_bucket, SIGMA.cors_preflight_age_too_long_openapi_x_a127, SIGMA.cors_preflight_age_too_long_openapi_x_amazon_apigateway, SIGMA.cors_preflight_age_too_long_openapi_x_amazon_apigateway_integration, SIGMA.cors_preflight_age_too_long_terraform_aws_s3_bucket, SIGMA.cors_preflight_age_too_long_terraform_google_storage_bucket, SIGMA.javascript_code_in_description_openapi, SIGMA.remote_execution_enabled_consul, SIGMA.script_checks_enabled_consul, TAINTED_SCALAR, TEMPLATE_INJECTION, TEMPORARY_CREDENTIALS_DURATION, UNCHECKED_ORIGIN, UNKNOWN_LANGUAGE_INJECTION, UNRESTRICTED_DISPATCH, UNRESTRICTED_MESSAGE_TARGET, UNSAFE_DESERIALIZATION, UNSAFE_JNI, UNSAFE_NAMED_QUERY, UNSAFE_REFLECTION, XPATH_INJECTION

APSC-DV-002540

The application must not be vulnerable to SQL injection.

CONFIG.MYBATIS_MAPPER_SQLI, DYNAMIC_OBJECT_ATTRIBUTES, FB.SQL_NONCONSTANT_STRING_PASSED_TO_EXECUTE, FB.SQL_PREPARED_STATEMENT_GENERATED_FROM_NONCONSTANT_STRING, JSP_SQL_INJECTION, NOSQL_QUERY_INJECTION, PMD.ApexSOQLInjection, RUBY_VULNERABLE_LIBRARY, SQLI, SQL_NOT_CONSTANT

APSC-DV-002550

The application must not be vulnerable to XML-oriented attacks.

UNSAFE_XML_PARSE_CONFIG, WEAK_XML_SCHEMA, XML_EXTERNAL_ENTITY, XML_INJECTION, XPATH_INJECTION

APSC-DV-002560

The application must not be subject to input-handling vulnerabilities.

CERT ARR00-C, CERT CTR55-CPP, CERT STR53-CPP, NEGATIVE_RETURNS, REVERSE_NEGATIVE, TAINTED_SCALAR

APSC-DV-002570

The application must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.

CONFIG.CORDOVA_EXCESSIVE_LOGGING, CONFIG.SPRING_BOOT_SENSITIVE_LOGGING, EXPRESS_WINSTON_SENSITIVE_LOGGING, INSUFFICIENT_LOGGING, SENSITIVE_DATA_LEAK, SIGMA.logging_disabled_cloudformation_aws_s3_bucket, SIGMA.logging_disabled_consul, SIGMA.logging_disabled_istio, SIGMA.logging_disabled_kubernetes, SIGMA.logging_disabled_terraform_aws_load_balancer, SIGMA.logging_disabled_terraform_aws_s3_bucket, SIGMA.query_logging_enabled_sequelize, SIGMA.request_tracing_disabled_cloudformation_lambda, SIGMA.request_tracing_disabled_istio, SIGMA.request_tracing_disabled_terraform_aws_api_gateway, UNLOGGED_SECURITY_EXCEPTION

APSC-DV-002590

The application must not be vulnerable to overflow attacks.

ALLOC_FREE_MISMATCH, ARRAY_VS_SINGLETON, BAD_ALLOC_ARITHMETIC, BAD_ALLOC_STRLEN, BAD_CERT_VERIFICATION, BAD_FREE, BUFFER_SIZE, CALL_SUPER, CHAR_IO, COM.ADDROF_LEAK, COM.BAD_FREE, COM.BSTR.ALLOC, COM.BSTR.CONV, CTOR_DTOR_LEAK, DELETE_ARRAY, DELETE_VOID, EVALUATION_ORDER, FB.BX_BOXING_IMMEDIATELY_UNBOXED_TO_PERFORM_COERCION, FB.ICAST_BAD_SHIFT_AMOUNT, FB.ICAST_IDIV_CAST_TO_DOUBLE, FB.ICAST_INTEGER_MULTIPLY_CAST_TO_LONG, FB.ICAST_INT_2_LONG_AS_INSTANT, FB.ICAST_INT_CAST_TO_DOUBLE_PASSED_TO_CEIL, FB.ICAST_INT_CAST_TO_FLOAT_PASSED_TO_ROUND, FB.ICAST_QUESTIONABLE_UNSIGNED_RIGHT_SHIFT, INCOMPATIBLE_CAST, INTEGER_OVERFLOW, INVALIDATE_ITERATOR, MISMATCHED_ITERATOR, MISRA_CAST, MISSING_COPY_OR_ASSIGN, NEGATIVE_RETURNS, NO_EFFECT, OVERRUN, PW.BAD_CAST, PW.CONVERSION_TO_POINTER_LOSES_BITS, RAILS_DEVISE_CONFIG, READLINK, RESOURCE_LEAK, REVERSE_NEGATIVE, SENSITIVE_DATA_LEAK, SIGN_EXTENSION, SIZECHECK, SQLI, STACK_USE, STRING_NULL, STRING_OVERFLOW, STRING_SIZE, TAINTED_SCALAR, UNSAFE_FUNCTIONALITY, USE_AFTER_FREE, VIRTUAL_DTOR, WRAPPER_ESCAPE, WRITE_CONST_FIELD, Y2K38_SAFETY This ASD STIG ID is also partially covered by some checkers for the SEI CERT C/ C++, MISRA, and AUTOSAR standards. Contact Synopsys to obtain a full list of checkers that address the issues related to STIG ID APSC-DV-002590. Synopsys customers can also find this list in the Checker Reference technical guide.

APSC-DV-003100

The application must use encryption to implement key exchange and authenticate endpoints prior to establishing a communication channel for key exchange.

BAD_CERT_VERIFICATION, CERT SEC02-J, CERT SEC06-J, CONFIG.BEEGO_CSRF_PROTECTION_DISABLED, CONFIG.CSURF_IGNORE_METHODS, CONFIG.DJANGO_CSRF_PROTECTION_DISABLED, CONFIG.HANA_XS_PREVENT_XSRF_DISABLED, CONFIG.SPRING_SECURITY_CSRF_PROTECTION_DISABLED, CONFIG.SYMFONY_CSRF_PROTECTION_DISABLED, CONFIG.UNSAFE_SESSION_TIMEOUT, CORS_MISCONFIGURATION, CORS_MISCONFIGURATION_AUDIT, CSRF, CSRF_MISCONFIGURATION_HAPI_CRUMB, HOST_HEADER_VALIDATION_DISABLED, HPKP_MISCONFIGURATION, INSUFFICIENT_PRESIGNED_URL_TIMEOUT, JSONWEBTOKEN_UNTRUSTED_DECODE, MULTER_MISCONFIGURATION, PMD.VfCsrf, RISKY_CRYPTO, RUBY_VULNERABLE_LIBRARY, SA.RISKY_CRYPTO, SIGMA.cors_preflight_age_too_long_cloudformation_aws_s3_bucket, SIGMA.cors_preflight_age_too_long_openapi_x_a127, SIGMA.cors_preflight_age_too_long_openapi_x_amazon_apigateway, SIGMA.cors_preflight_age_too_long_openapi_x_amazon_apigateway_integration, SIGMA.cors_preflight_age_too_long_terraform_aws_s3_bucket, SIGMA.cors_preflight_age_too_long_terraform_google_storage_bucket, SIGMA.csrf_openapi, SIGMA.jwt_algorithm_none_auth0_jwt, SIGMA.jwt_untrusted_decode_jsonwebtoken, SIGMA.jwt_untrusted_decode_kafka, SIGMA.missing_mtls_consul, SIGMA.missing_mtls_istio_port, SIGMA.missing_mtls_istio_service, SIGMA.missing_mtls_istio_workload, SIGMA.missing_mtls_kafka_broker, SIGMA.missing_mtls_rabbitmq, TEMPORARY_CREDENTIALS_DURATION, UNCHECKED_ORIGIN, WEAK_GUARD

APSC-DV-003110

The application must not contain embedded authentication data.

CERT MSC03-J, CONFIG.CONNECTION_STRING_PASSWORD, CONFIG.HARDCODED_CREDENTIALS_AUDIT, CONFIG.HARDCODED_TOKEN, CONFIG.SPRING_SECURITY_HARDCODED_CREDENTIALS, FB.DMI_CONSTANT_DB_PASSWORD, FB.DMI_EMPTY_DB_PASSWORD, HARDCODED_CREDENTIALS, PMD.ApexBadCrypto, PMD.ApexSuggestUsingNamedCred, SIGMA.hardcoded_credential_core_swift, SIGMA.hardcoded_remember_me_key_spring_security, UNSAFE_BASIC_AUTH, UNSAFE_SESSION_SETTING

APSC-DV-003215

The application development team must follow a set of coding standards.

ALLOC_FREE_MISMATCH, ANONYMOUS_DB_CONNECTION, ASSERT_SIDE_EFFECT, ASSIGN_NOT_RETURNING_STAR_THIS, AWS_VALIDATION_DISABLED, BAD_COMPARE, BAD_EQ, BAD_EQ_TYPES, BAD_OVERRIDE, BAD_SHIFT, BAD_SIZEOF, BUFFER_SIZE, CALL_SUPER, CHAR_IO, CHROOT, COM.ADDROF_LEAK, COM.BAD_FREE, COM.BSTR.BAD_COMPARE, COM.BSTR.NE_NON_BSTR, CONFIG.COOKIES_MISSING_HTTPONLY, CONFIG.COOKIE_SIGNING_DISABLED, CONFIG.DEAD_AUTHORIZATION_RULE, CONFIG.DUPLICATE_SERVLET_DEFINITION, CONFIG.HTTP_VERB_TAMPERING, CONFIG.SPRING_BOOT_SSL_DISABLED, CONFIG.SPRING_SECURITY_SESSION_FIXATION, CONFIG.STRUTS2_DYNAMIC_METHOD_INVOCATION, CONFIG.UNSAFE_SESSION_TIMEOUT, CONSTANT_EXPRESSION_RESULT, COOKIE_INJECTION, COPY_PASTE_ERROR, COPY_WITHOUT_ASSIGN, CORS_MISCONFIGURATION, CORS_MISCONFIGURATION_AUDIT, DC.DANGEROUS, DC.DEADLOCK, DC.STREAM_BUFFER, DC.STRING_BUFFER, DEADCODE, EL_INJECTION, ENUM_AS_BOOLEAN, EVALUATION_ORDER, EXPLICIT_THIS_EXPECTED, HFA, HIBERNATE_BAD_HASHCODE, HPKP_MISCONFIGURATION, IDENTICAL_BRANCHES, IDENTIFIER_TYPO, INCOMPATIBLE_CAST, INSECURE_HTTP_FIREWALL, INVALIDATE_ITERATOR, MISMATCHED_ITERATOR, MISRA_CAST, MISSING_AUTHZ, MISSING_BREAK, MISSING_COMMA, MISSING_COPY_OR_ASSIGN, MISSING_MOVE_ASSIGNMENT, MISSING_RESTORE, MISSING_RETURN, MISSING_THROW, MIXED_ENUMS, NEGATIVE_RETURNS, NESTING_INDENT_MISMATCH, NO_EFFECT, OPEN_ARGS, ORM_LOAD_NULL_CHECK, ORM_LOST_UPDATE, ORM_UNNECESSARY_GET, OVERFLOW_BEFORE_WIDEN, PARSE_ERROR, PASS_BY_VALUE, PROPERTY_MIXUP, PW.ASSIGN_WHERE_COMPARE_MEANT, PW.BAD_CAST, PW.BAD_PRINTF_FORMAT_STRING, PW.BRANCH_PAST_INITIALIZATION, PW.CONVERSION_TO_POINTER_LOSES_BITS, PW.DIVIDE_BY_ZERO, PW.EXPR_HAS_NO_EFFECT, PW.INCLUDE_RECURSION, PW.INTEGER_OVERFLOW, PW.INTEGER_TOO_LARGE, PW.NON_CONST_PRINTF_FORMAT_STRING, PW.RETURN_PTR_TO_LOCAL_TEMP, PW.SHIFT_COUNT_TOO_LARGE, PW.TOO_FEW_PRINTF_ARGS, PW.TOO_MANY_PRINTF_ARGS, PW.UNSIGNED_COMPARE_WITH_NEGATIVE, READLINK, REGEX_CONFUSION, RETURN_LOCAL, SECURE_TEMP, SELF_ASSIGN, SIGN_EXTENSION, SIZEOF_MISMATCH, SLEEP, STRAY_SEMICOLON, STREAM_FORMAT_STATE, SWAPPED_ARGUMENTS, TAINT_ASSERT, UNINIT, UNINIT_CTOR, UNINIT_NONNULL, UNINTENDED_GLOBAL, UNINTENDED_INTEGER_DIVISION, UNREACHABLE, UNUSED_VALUE, USELESS_CALL, USER_POINTER, USE_AFTER_FREE, VARARGS, VIRTUAL_DTOR, WRAPPER_ESCAPE, WRONG_METHOD This ASD STIG ID is also partially covered by checkers for the SEI CERT C/C++, SEI CERT Java, MISRA, and AUTOSAR standards. Contact Synopsys to obtain a full list of checkers that address the issues related to STIG ID APSC-DV-003215. Synopsys customers can also find this list in the Checker Reference technical guide.

APSC-DV-003235

The application must not be subject to error-handling vulnerabilities.

BAD_COMPARE, CHECKED_RETURN, FB.RV_RETURN_VALUE_IGNORED_BAD_PRACTICE, NEGATIVE_RETURNS, ORM_LOAD_NULL_CHECK, REVERSE_NEGATIVE, UNCAUGHT_EXCEPT

APSC-DV-003300

The designer must ensure uncategorized or emerging mobile code is not used in applications.

CERT OBJ10-J, CERT SER05-J, FB.EI_EXPOSE_REP, FB.EI_EXPOSE_REP2, FB.FI_PUBLIC_SHOULD_BE_PROTECTED, FB.MS_CANNOT_BE_FINAL

APSC-DV-003320

Protections against DoS attacks must be implemented.

AUTOSAR C++14 A5-3-2, AUTOSAR C++14 A5-6-1, AUTOSAR C++14 A8-4-10, BAD_FREE, CERT CON35-C, CERT CON53-CPP, CERT ERR08-J, CERT EXP01-J, CERT EXP34-C, CERT INT33-C, CERT LCK08-J, CERT MEM34-C, CERT NUM02-J, CERT STR38-C, CERT STR51-CPP, COM.BSTR.CONV, DC.DEADLOCK, DIVIDE_BY_ZERO, FB.BC_NULL_INSTANCEOF, FB.NP_ALWAYS_NULL, FB.NP_ALWAYS_NULL_EXCEPTION, FB.NP_ARGUMENT_MIGHT_BE_NULL, FB.NP_BOOLEAN_RETURN_NULL, FB.NP_CLONE_COULD_RETURN_NULL, FB.NP_CLOSING_NULL, FB.NP_DEREFERENCE_OF_READLINE_VALUE, FB.NP_DOES_NOT_HANDLE_NULL, FB.NP_EQUALS_SHOULD_HANDLE_NULL_ARGUMENT, FB.NP_FIELD_NOT_INITIALIZED_IN_CONSTRUCTOR, FB.NP_GUARANTEED_DEREF, FB.NP_GUARANTEED_DEREF_ON_EXCEPTION_PATH, FB.NP_IMMEDIATE_DEREFERENCE_OF_READLINE, FB.NP_LOAD_OF_KNOWN_NULL_VALUE, FB.NP_METHOD_PARAMETER_RELAXING_ANNOTATION, FB.NP_METHOD_PARAMETER_TIGHTENS_ANNOTATION, FB.NP_METHOD_RETURN_RELAXING_ANNOTATION, FB.NP_NONNULL_FIELD_NOT_INITIALIZED_IN_CONSTRUCTOR, FB.NP_NONNULL_PARAM_VIOLATION, FB.NP_NONNULL_RETURN_VIOLATION, FB.NP_NULL_INSTANCEOF, FB.NP_NULL_ON_SOME_PATH, FB.NP_NULL_ON_SOME_PATH_EXCEPTION, FB.NP_NULL_ON_SOME_PATH_FROM_RETURN_VALUE, FB.NP_NULL_ON_SOME_PATH_MIGHT_BE_INFEASIBLE, FB.NP_NULL_PARAM_DEREF, FB.NP_NULL_PARAM_DEREF_ALL_TARGETS_DANGEROUS, FB.NP_NULL_PARAM_DEREF_NONVIRTUAL, FB.NP_OPTIONAL_RETURN_NULL, FB.NP_PARAMETER_MUST_BE_NONNULL_BUT_MARKED_AS_NULLABLE, FB.NP_STORE_INTO_NONNULL_FIELD, FB.NP_TOSTRING_COULD_RETURN_NULL, FB.NP_UNWRITTEN_FIELD, FB.NP_UNWRITTEN_PUBLIC_OR_PROTECTED_FIELD, FB.RCN_REDUNDANT_COMPARISON_OF_NULL_AND_NONNULL_VALUE, FB.RCN_REDUNDANT_COMPARISON_TWO_NULL_VALUES, FB.RCN_REDUNDANT_NULLCHECK_OF_NONNULL_VALUE, FB.RCN_REDUNDANT_NULLCHECK_OF_NULL_VALUE, FB.RCN_REDUNDANT_NULLCHECK_WOULD_HAVE_BEEN_A_NPE, FORWARD_NULL, INFINITE_LOOP, LOCK_INVERSION, NULL_RETURNS, ORDER_REVERSAL, PW.DIVIDE_BY_ZERO, REVERSE_INULL, TAINTED_SCALAR, UNINIT_NONNULL

This table applies to Coverity 2021.9.0 and later releases