STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Web Server Security Requirements Guide

V-206402

CAT II (Medium)

The web server must generate a session ID using as much of the character set as possible to reduce the risk of brute force.

Rule ID

SV-206402r1043181_rule

STIG

Web Server Security Requirements Guide

Version

V4R4

CCIs

CCI-001188

Discussion

Generating a session identifier (ID) that is not easily guessed through brute force is essential to deter several types of session attacks. By knowing the session ID, an attacker can hijack a user session that has already been user-authenticated by the hosted application. The attacker does not need to guess user identifiers and passwords or have a secure token since the user session has already been authenticated. By generating session IDs that contain as much of the character set as possible, i.e., A-Z, a-z, and 0-9, the session ID becomes exponentially harder to guess.

Check Content

Review the web server documentation and deployed configuration to determine what characters are used in generating session IDs.

If the web server is not configured to use at least A-Z, a-z, and 0-9 to generate session identifiers, this is a finding.

Fix Text

Configure the web server to use at least A-Z, a-z, and 0-9 to generate session IDs.