[ISM] Security verification:

The OWASP Application Security Verification Standard is used in the development of web applications.

[OWASP] Ensure secure session management (SSS-02-11-03)

Ensure secure session management by establishing, maintaining, and terminating sessions with strong security measures. For example, generate unique, unpredictable session identifiers and enforce session expiration policies to minimize exposure to session hijacking attacks; Implement secure cookie attributes and restrict session reuse across devices and locations; Continuously log, audit, and monitor session-related activities to detect anomalies and potential security threats.

[OWASP] Apply session security best practices (SSS-02-11-03-01)

V3.1 Fundamental Session Management Requirements Use unique, high-entropy session IDs and ensure they are confidential. Limit session lifetime and ensure sessions are invalidated on logout. V3.2 Session Binding Requirements Bind sessions to specific contexts (IP, device) to prevent hijacking. Regenerate session IDs when context changes. V3.3 Session Logout and Timeout Requirements Timeout sessions after inactivity and ensure secure logout that invalidates the session on the server. V3.4 Cookie-based Session Management Use Secure, HttpOnly, and SameSite flags for cookies to secure them. Set cookie expiration for session cookies. V3.5 Token-based Session Management Use signed and encrypted tokens with short expiration and token validation on each request. V3.6 Re-authentication from a Federation or Assertion Ensure re-authentication for federated logins (e.g., OAuth, SAML) with strong token validation. V3.7 Defenses Against Session Management Exploits Regenerate session IDs to prevent session fixation and monitor for suspicious session activity. Implement rate limiting to prevent brute-force attacks. By regenerating session IDs, binding sessions to contexts, and ensuring secure cookie management, you can effectively secure user sessions.

Operations

ID Operation Description Phase Agent
SSS-02-11-03-01-01 Establish secure session management Implement secure session handling mechanisms, ensuring unique session IDs and protection against session fixation and hijacking. Use cryptographically strong session identifiers. Implementation Security Teams, Software Architects
SSS-02-11-03-01-02 Enforce secure cookie attributes Configure cookies with security attributes such as HttpOnly, Secure, and SameSite to protect against Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) attacks. Development Security Teams
SSS-02-11-03-01-03 Implement session expiration policies Prevent session timeout exploitation by enforcing session expiration, automatic logout for inactive users, and short-lived session tokens. Require re-authentication for sensitive actions. Deployment Security Teams, Compliance Officers
SSS-02-11-03-01-04 Ensure proper logout and session revocation Implement a robust logout mechanism that invalidates session tokens and prevents reuse. Ensure session revocation occurs on logout or after authentication context changes. Post-deployment Security Engineers, DevOps Teams
SSS-02-11-03-01-05 Monitor and audit session activities Continuously monitor active sessions, detect anomalies, and log session-related events to identify potential security risks. Implement automated session termination for detected threats. Post-deployment Security Teams, Compliance Officers

References

Industry framework Academic work Real-world case
Information Security Manual (ISM-0971)
OWASP Application Security Verification Standard
OWASP Application Security Verification Standard