153 – Out of band transactions
Summary
The system must offer secure out of band authenticators, such as push notifications. Clear text options such as SMS, mailing or PSTN may be offered but should not be the default option.
Description
Secure out of band authenticators are physical devices that can communicate with an authentication verifier over a secure secondary channel. They serve as an additional security measure for identity assertion during authentication processes or sensitive transactions. Systems should offer at least one out of band authenticator and the default option should not be a clear text one.
Supported In
Advanced: True
References
- CWE-523. Unprotected transport of credentials
- OWASP10-A7. Identification and authentication failures
- OWASPM10-M4. Insecure authentication
- SANS25-13. Improper authentication
- POPIA-9_72. Transfers of personal information outside Republic
- CMMC-AC_L2-3_1_12. Control remote access
- CMMC-MP_L2-3_8_1. Media protection
- CMMC-MP_L2-3_8_5. Media accountability
- HITRUST-01_y. Teleworking
- HITRUST-09_y. On-line transactions
- FEDRAMP-CA-3_3. Unclassified non-national security system connections
- FEDRAMP-MP-5. Media transport
- OSSTMM3-9_5_4. Wireless security (access verification) - Authentication
- ISSAF-G_12. Network security - Firewalls (port redirection)
- ISSAF-G_14. Network security - Firewalls (countermeasures)
- ISSAF-G_15. Network security - Firewalls (compromise remote users/sites)
- OWASPSCP-3. Authentication and password management
- SWIFTCSC-2_1. Internal data flow security
- SWIFTCSC-2_5A. External transmission data protection
- ASVS-2_2_3. General authenticator security
- ASVS-2_7_1. Out of band verifier
- SIGLITE-SL_73. Is remote access permitted?
- SIG-H_4. Access control
- SIG-I_1_6. Application security
- ASVS-2_2_2. General authenticator security
- ASVS-2_2_7. General authenticator security
- ASVS-2_3_2. Authenticator lifecycle
- ASVS-4_3_1. Other access control considerations
- CASA-2_7_5. Out of Band Verifier
- CASA-4_3_1. Other Access Control Considerations
- CWE25-287. Improper authentication
Weaknesses
Last updated
2024/02/07