Verify that connections to and from the server use trusted TLS certificates. Where internally generated or self-signed certificates are used, the server must be configured to only trust specific internal CAs and specific self-signed certificates. All others should be rejected.
Level 1 required: False
Level 2 required: True
Level 3 required: True
CWE: 295
Verify that encrypted communications such as TLS is used for all inbound and outbound connections, including for management ports, monitoring, authentication, API, or web service calls, database, cloud, serverless, mainframe, external, and partner connections. The server must not fall back to insecure or unencrypted protocols.
Level 1 required: False
Level 2 required: True
Level 3 required: True
CWE: 319
Verify that all encrypted connections to external systems that involve sensitive information or functions are authenticated.
Level 1 required: False
Level 2 required: True
Level 3 required: True
CWE: 287
Verify that proper certification revocation, such as Online Certificate Status Protocol (OCSP) Stapling, is enabled and configured.
Level 1 required: False
Level 2 required: True
Level 3 required: True
CWE: 299
Verify that backend TLS connection failures are logged.
Level 1 required: False
Level 2 required: False
Level 3 required: True
CWE: 544
Credit via OWASP ASVS. For more information visit The OWASP ASVS Project or Github respository.. OWASP ASVS is under the Creative Commons Attribution-Share Alike v3.0 license.
Loading comments 0%