Out of band transactions
Summary​
The system must offer secure out of band authenticators, such as push notifications. Clear text options such as SMS, mailing or PSTN may be offered but should not be the default option.
Description​
Secure out of band authenticators are physical devices that can communicate with an authentication verifier over a secure secondary channel. They serve as an additional security measure for identity assertion during authentication processes or sensitive transactions. Systems should offer at least one out of band authenticator and the default option should not be a clear text one.
Supported In​
This requirement is verified in following services
Plan | Supported |
---|---|
Machine | 🔴 |
Squad | 🟢 |
References​
- CWEâ„¢-523. Unprotected transport of credentials
- OWASP TOP 10-A7. Identification and authentication failures
- OWASP-M TOP 10-M4. Insecure authentication
- NIST Framework-PR_PT-2. Removable media is protected and its use restricted according to policy
- SANS 25-14. Improper Authentication
- POPIA-9_72. Transfers of personal information outside Republic
- CMMC-AC_L2-3_1_12. Control remote access
- CMMC-MP_L2-3_8_1. Media protection
- CMMC-MP_L2-3_8_5. Media accountability
- HITRUST CSF-01_y. Teleworking
- HITRUST CSF-09_y. On-line transactions
- FedRAMP-CA-3_3. Unclassified non-national security system connections
- FedRAMP-MP-5. Media transport
- OSSTMM3-9_5_4. Wireless security (access verification) - Authentication
- ISSAF-G_12. Network security - Firewalls (port redirection)
- ISSAF-G_14. Network security - Firewalls (countermeasures)
- ISSAF-G_15. Network security - Firewalls (compromise remote users/sites)
- OWASP SCP-3. Authentication and password management
- OWASP MASVS-V4_10. Authentication and session management requirements
- OWASP MASVS-V5_5. Network communication requirements
- SWIFT CSCF-2_1. Internal data flow security
- SWIFT CSCF-2_5. External transmission data protection
- OWASP ASVS-2_2_3. General authenticator security
- OWASP ASVS-2_7_1. Out of band verifier
- SIG Lite-SL_73. Is remote access permitted?
- SIG Core-H_4. Access control
- SIG Core-I_1_6. Application security
- OWASP ASVS-2_2_2. General authenticator security
- OWASP ASVS-2_2_7. General authenticator security
- OWASP ASVS-2_3_2. Authenticator lifecycle
- OWASP ASVS-4_3_1. Other access control considerations
- OWASP MASVS-V4_9. Authentication and session management requirements
- CASA-2_7_5. Out of Band Verifier
- CASA-4_3_1. Other Access Control Considerations
Vulnerabilities​
Search for vulnerabilities in your apps for free with our automated security testing! Start your 21-day free trial and discover the benefits of our Continuous Hacking Machine Plan. If you prefer a full service that includes the expertise of our ethical hackers, don't hesitate to contact us for our Continuous Hacking Squad Plan.