-
-
Notifications
You must be signed in to change notification settings - Fork 668
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
3.3.2 - Update to correspond to NIST SP 800-63B revision 4 draft #2113
Comments
I think we will drop the references from the table of requirements although I think it would be good to try and keep a reference to them, maybe in the surrounding text of each section. |
Happy for you to PR this and we should reference somewhere the version of NIST that we relied on |
This is quite drastic.
Many users of applications which contain sensitive medical data would find it difficult to accept that they must reauthenticate every hour. For example, ProSantéConnect, a French IdP for health practitioners (i.e. access to sensitive medical data) enforces reauthentication after 4 hours. |
@randomstuff - the referenced requirement in the opened issue is the requirement as it stand at the moment (not proposed requitement). This issue is about to make the requirement flexible based on documentation requirement, see #2076 (comment) |
Reading it again, maybe it's not that clear. @ryarmst - we should not discuss here what are the fixed values, as we solved it with documentation, only thing what we should say with this requirement is something like:
|
@randomstuff Sorry, this was an error/typo on my part (it's 12 hours for AAL3). It should be:
@elarlang Regarding fixed values, I would agree that there is room to relax the requirement, especially considering NIST is relaxing timings from SHALL to SHOULD in some cases (though not all). From NIST (the new draft):
That said, I would argue against collapsing/relaxing requirements. From a testability point of view, your proposed requirement is impossible to evaluate without documentation. |
I don't get it. We (will) have documentation requirement via #2076 (comment)
and my comment #2113 (comment) points to that with proposing direction
If we want to set directions with time limits per level, it should belong to documentation requirement, otherwise those two proposals are in conflict - if documentation asks you decide based on your own risk level and implementation requires to user numbers from NIST. |
Yes, but I am thinking about this from my POV consuming the ASVS as a tester:
In general, I don't like the pattern "define timeouts to be whatever is appropriate, then confirm they are implemented as intended" as I think ASVS should be somewhat more opinionated.
Good point and I think I have a solution that should satisfy both of us. I will propose modifying the documentation requirement to something similar to "verify intended timeouts correspond with NIST and are documented otherwise document reasoning for exceptions". I would split the doc requirement into two (inactivity vs. absolute) and add references to the present NIST requirements (the actual timings). Then, the V3 requirement can be something like (simplifying for now): "Verify that timeouts correspond to NIST requirements and recommendations or the overriding timeouts specified within design documentation." Does this make sense? |
Without documented decision you can not develop and you can not test. It quite strong pre-condition built in for many requirements (take a look over V1). Also I proposed, that to cover NIST levels as fallback to the documentation requirement. I'm not from that religion who takes everything as pure gold from NIST and also we don't have any reason to take everything one-to-one from NIST. If it makes sense, we take it, if it does not, we don't. As something is presented in NIST, there is most likely a lot of brain-work behind that, but let put the context to NIST audience (gov oriented) that may not present well the entire Internet). In short - we don't need to be 100% aligned with NIST. You can stay logged in Gmail, Facebook, X, ... quite a long time. Gmail can be considered high-risk solution, would you like to log in there for example every day? Can you force everyone to do that? Are there other ways to mitigate the risk and not "being compatible" with NIST? I can re-explain it via some call. |
In conjunction with proposals for V1.3 documentation requirements (see #2076), I propose the following:
I will create a separate issue for inactivity once when consensus is reached on wording. |
Should it contain "despite user activity" or something like that? Although it duplicates the meaning a bit, it may be helpful. |
Going to suggest strongly with a PR. |
Branching from #1557.
Notably, the wording around timing has been relaxed. Does anyone have an opinion on whether the requirement reflect this (see below)?
In the previous version (AAL2):
In the revision 4 draft (AAL2):
I'll create an issue for the inactivity timeout requirements following any discussion here.
Additionally, are CWE and NIST references going to be kept for V5? The NIST ref will need to be updated if so.
The text was updated successfully, but these errors were encountered: