STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Web Server Security Requirements Guide

V-206355

CAT II (Medium)

The web server must enforce approved authorizations for logical access to hosted applications and resources in accordance with applicable access control policies.

Rule ID

SV-206355r1138069_rule

STIG

Web Server Security Requirements Guide

Version

V4R4

CCIs

CCI-000213

Discussion

To control access to sensitive information and hosted applications by entities that have been issued certificates by DOD-approved PKIs, the web server must be properly configured to incorporate a means of authorization that does not simply rely on the possession of a valid certificate for access. Access decisions must include a verification that the authenticated entity is permitted to access the information or application. Authorization decisions must leverage a variety of methods, such as mapping the validated PKI certificate to an account with an associated set of permissions on the system. If the web server relied only on the possession of the certificate and did not map to system roles and privileges, each user would have the same abilities and roles to make changes to the production system. This requirement also applies to Zero Trust initiatives.

Check Content

The web server must be configured to perform an authorization check to verify that the authenticated entity should be granted access to the requested content.

If the web server does not verify that the authenticated entity is authorized to access the requested content prior to granting access, this is a finding.

Fix Text

Configure the web server to validate the authenticated entity's authorization to access requested content prior to granting access.