ASVS icon indicating copy to clipboard operation
ASVS copied to clipboard

NIST for 2.3.4

Open tghosth opened this issue 2 years ago • 8 comments

@csfreak92 said he would confirm the ~~CWE~~ NIST mapping for this requirement as discussed here: https://github.com/OWASP/ASVS/pull/1263#issuecomment-1113002285

tghosth avatar May 02 '22 17:05 tghosth

is it actually closed and merged already?

elarlang avatar May 15 '22 17:05 elarlang

I think I meant the NIST mapping 🤦‍♂️

tghosth avatar May 17 '22 15:05 tghosth

Well, to be fair... CWE mapping needs a second look too.

csfreak92 avatar May 17 '22 15:05 csfreak92

CWE is a whole other thing, let's worry about NIST for now. If you can do it then great but I think I will mark this as not critical for 5.0

tghosth avatar Jun 14 '22 16:06 tghosth

Hi @tghosth, can you please assign this to me so that it doesn't go off my radar? I keep forgetting it. Thanks!

csfreak92 avatar Jul 23 '22 05:07 csfreak92

@tghosth, what if in NIST there is nothing that explicitly says anything about an administrator setting up a user's default password (i,e. the main reason we had this new 2.3.4 requirement)? I am having a hard time finding the closest one to it though...

csfreak92 avatar Aug 05 '22 16:08 csfreak92

I guess if we cannot, then we cannot... If you are sure

tghosth avatar Aug 07 '22 15:08 tghosth

Let me give it a few passes in reading to ensure I did not miss it somewhere in their docs. I will confirm here whatever I find out.

csfreak92 avatar Aug 07 '22 18:08 csfreak92

Hi @tghosth, I have read NIST SP 800-63 with a few more passes and cannot really find anything close to this ASVS requirement we have added. However, for NIST SP 800-53r5 I found something arguably closest which is: AC-6 (5) which states:

LEAST PRIVILEGE | PRIVILEGED ACCOUNTS
Restrict privileged accounts on the system to [Assignment: organization-defined personnel
or roles].
Discussion: Privileged accounts, including super user accounts, are typically described as
system administrator for various types of commercial off-the-shelf operating systems.
Restricting privileged accounts to specific personnel or roles prevents day-to-day users from
accessing privileged information or privileged functions. Organizations may differentiate in
the application of restricting privileged accounts between allowed privileges for local
accounts and for domain accounts provided that they retain the ability to control system
configurations for key parameters and as otherwise necessary to sufficiently mitigate risk.
Related Controls: IA-2, MA-3, MA-4.

Again, arguably this is the closest as there were no specifics in NIST that mentions something similar to what we are trying to have developers not do, which in this case is giving them guidelines that system administrators resetting user's passwords and selecting themselves is a terrible idea. I am quite surprised NIST doesn't have anything about it, but maybe because they deem it is basically common sense (which isn't really common at all based on my experiences testing a lot of web apps I still see this issue resurface from time to time).

My rationality for this being the closest NIST mapping is it says system administrators/privileged accounts should be differentiated by organizations to be restricted with accessing privileged information or privileged functions (such as resetting other user's passwords and then selecting them on their own).

What do you think about this mapping? For sure we don't need to force it if it seems too far-fetched, but that's the closest I can see.

csfreak92 avatar Sep 14 '22 05:09 csfreak92

Helper - current 2.3.4 requirement:

# Description L1 L2 L3 CWE NIST §
2.3.4 [ADDED] System administrators should not be able to change or choose any user's password, but rather only be able to initiate the password reset process for the user. 620

Based on your information I would keep the mapping empty as there is no clear match.

And issue is ready to be closed?

elarlang avatar Sep 14 '22 06:09 elarlang

@elarlang, yes I think that's the best way to keep it that way. Yup, I think we can close this issue determining there's no clear mapping.

csfreak92 avatar Sep 14 '22 06:09 csfreak92

Thank you for the effort!

elarlang avatar Sep 14 '22 06:09 elarlang