V-222533
Application Security and Development Security Technical Implementation Guide
Title
The application must authenticate all network connected endpoint devices before establishing any connection.
Description
<VulnDiscussion>Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. For distributed architectures (e.g., service-oriented architectures), the decisions regarding the validation of authentication claims may be made by services separate from the services acting on those decisions. In such situations, it is necessary to provide authentication decisions (as opposed to the actual authenticators) to the services that need to act...
Fix Text (Documentation Requirement)
Configure the application to authenticate all network connected endpoint devices/service consumers before establishing connections.