Define credential interface
Summary
The authentication must have a separate interface for on-screen credentials input.
Description
empty
Supported In
This requirement is verified in following services
Plan | Supported |
---|---|
Machine | 🟢 |
Squad | 🟢 |
References
- NIST 800-53-SC-3. Security function isolation
- OWASP TOP 10-A5. Security misconfiguration
- HITRUST CSF-08_b. Physical entry controls
- ISO/IEC 27002-7_3. Securing offices, rooms and facilities
- WASC-W_01. Insufficient authentication
- OWASP MASVS-V2_7. Security verification requirements
- NIST 800-171-1_17. Protect wireless access using authentication and encryption
- OWASP ASVS-14_1_5. Build and deploy
- CWE™-1262. Improper access control for register interface
- ISO/IEC 27001-7_3. Securing offices, rooms and facilities
- CASA-14_1_5. Build and Deploy
Vulnerabilities
- 006. Authentication mechanism absence or evasion
- 240. Authentication mechanism absence or evasion - OTP
- 241. Authentication mechanism absence or evasion - AWS
- 242. Authentication mechanism absence or evasion - WiFi
- 243. Authentication mechanism absence or evasion - Admin Console
- 244. Authentication mechanism absence or evasion - BIOS
- 298. Authentication mechanism absence or evasion - Redirect
- 299. Authentication mechanism absence or evasion - JFROG
- 300. Authentication mechanism absence or evasion - Azure
- 365. Authentication mechanism absence or evasion - Response tampering
- 370. Authentication mechanism absence or evasion - Security Image
free trial
Search for vulnerabilities in your apps for free with our automated security testing! Start your 21-day free trial and discover the benefits of our Continuous Hacking Machine Plan. If you prefer a full service that includes the expertise of our ethical hackers, don't hesitate to contact us for our Continuous Hacking Squad Plan.