335 – Define out of band token lifespan
Summary
The system must expire out of band authentication requests, codes or tokens after 10 minutes and should only allow them to be used once within this period.
Description
Secure out of band authenticators are physical devices that can communicate with an authentication verifier over a secure secondary channel. They serve as an additional security measure for identity assertion during authentication processes or sensitive transactions. Systems should expire out of band tokens after 10 minutes and allow them to be used only once within this period to prevent replay attacks.
Supported In
Advanced: True
References
- CWE-294. Authentication bypass by capture-replay
- NIST80063-5_1_3_2. Out-of-band verifiers
- OWASP10-A7. Identification and authentication failures
- OWASPM10-M4. Insecure authentication
- PADSS-1_1_1. Do not store full contents of any track from the magnetic stripe
- PADSS-1_1_2. Do not store the card verification value or code used to verify transactions
- PADSS-1_1_4. Securely delete any track data, card verification values or codes, and PINs or PIN block data stored by application in accordance with industry-accepted standards
- SANS25-13. Improper authentication
- CMMC-IA_L2-3_5_5. Identifier reuse
- HITRUST-09_y. On-line transactions
- FEDRAMP-MP-5. Media transport
- FEDRAMP-SC-10. Network disconnect
- IEC62443-CR-1_1-RE_1. Unique identification and authentication
- WASSEC-3_4. Session token refresh policy
- OSSTMM3-8_7_2. Physical security (controls verification) - Confidentiality
- WASC-W_47. Insufficient session expiration
- OWASPRISKS-P8. Missing or insufficient session expiration
- SWIFTCSC-5_2. Token management
- ASVS-2_7_2. Out of band verifier
- ASVS-2_7_3. Out of band verifier
- CASA-2_7_2. Out of Band Verifier
- CASA-2_7_3. Out of Band Verifier
- CWE25-287. Improper authentication
Weaknesses
Last updated
2024/02/05