Define out of band token lifespan
Summary
The system must expire out of band authentication requests, codes or tokens after 10 minutes and should only allow them to be used once within this period.
Description
Secure out of band authenticators are physical devices that can communicate with an authentication verifier over a secure secondary channel. They serve as an additional security measure for identity assertion during authentication processes or sensitive transactions. Systems should expire out of band tokens after 10 minutes and allow them to be used only once within this period to prevent replay attacks.
References
- CWE-294. Authentication bypass by capture-replay
- NIST80063-5_1_3_2. Out-of-band verifiers
- OWASP10-A7. Identification and authentication failures
- OWASPM10-M4. Insecure authentication
- PADSS-1_1_1. Do not store full contents of any track from the magnetic stripe
- PADSS-1_1_2. Do not store the card verification value or code used to verify transactions
- PADSS-1_1_4. Securely delete any track data, card verification values or codes, and PINs or PIN block data stored by application in accordance with industry-accepted standards
- SANS25-13. Improper authentication
- CMMC-IA_L2-3_5_5. Identifier reuse
- HITRUST-09_y. On-line transactions
- FEDRAMP-MP-5. Media transport
- FEDRAMP-SC-10. Network disconnect
- IEC62443-CR-1_1-RE_1. Unique identification and authentication
- WASSEC-3_4. Session token refresh policy
- OSSTMM3-8_7_2. Physical security (controls verification) - Confidentiality
- WASC-W_47. Insufficient session expiration
- OWASPRISKS-P8. Missing or insufficient session expiration
- SWIFTCSC-5_2. Token management
- ASVS-2_7_2. Out of band verifier
- ASVS-2_7_3. Out of band verifier
- CASA-2_7_2. Out of Band Verifier
- CASA-2_7_3. Out of Band Verifier
- CWE25-287. Improper authentication
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan.If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.
Supported In
This requirement is verified in following services
Essential Plan
Advanced Plan