Out of band transactions
Summary​
The system must offer secure out of band authenticators, such as push notifications. Clear text options such as SMS, mailing or PSTN may be offered but should not be the default option.
Description​
Secure out of band authenticators are physical devices that can communicate with an authentication verifier over a secure secondary channel. They serve as an additional security measure for identity assertion during authentication processes or sensitive transactions. Systems should offer at least one out of band authenticator and the default option should not be a clear text one.
Supported In​
This requirement is verified in following services
Plan | Supported |
---|---|
Essential | 🔴 |
Advanced | 🟢 |
References​
- CWEâ„¢-523. Unprotected transport of credentials
- OWASP TOP 10-A7. Identification and authentication failures
- OWASP-M TOP 10-M4. Insecure authentication
- SANS 25-13. Improper authentication
- POPIA-9_72. Transfers of personal information outside Republic
- CMMC-AC_L2-3_1_12. Control remote access
- CMMC-MP_L2-3_8_1. Media protection
- CMMC-MP_L2-3_8_5. Media accountability
- HITRUST CSF-01_y. Teleworking
- HITRUST CSF-09_y. On-line transactions
- FedRAMP-CA-3_3. Unclassified non-national security system connections
- FedRAMP-MP-5. Media transport
- OSSTMM3-9_5_4. Wireless security (access verification) - Authentication
- ISSAF-G_12. Network security - Firewalls (port redirection)
- ISSAF-G_14. Network security - Firewalls (countermeasures)
- ISSAF-G_15. Network security - Firewalls (compromise remote users/sites)
- OWASP SCP-3. Authentication and password management
- SWIFT CSCF-2_1. Internal data flow security
- SWIFT CSCF-2_5A. External transmission data protection
- OWASP ASVS-2_2_3. General authenticator security
- OWASP ASVS-2_7_1. Out of band verifier
- SIG Lite-SL_73. Is remote access permitted?
- SIG Core-H_4. Access control
- SIG Core-I_1_6. Application security
- OWASP ASVS-2_2_2. General authenticator security
- OWASP ASVS-2_2_7. General authenticator security
- OWASP ASVS-2_3_2. Authenticator lifecycle
- OWASP ASVS-4_3_1. Other access control considerations
- CASA-2_7_5. Out of Band Verifier
- CASA-4_3_1. Other Access Control Considerations
- CWE TOP 25-287. Improper authentication
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan. If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.