Server Communication Security

V9.2.1

Verify that connections to and from the server use trusted TLS certificates. Where internally generated or self-signed certificates are used, the server must be configured to only trust specific internal CAs and specific self-signed certificates. All others should be rejected.

Level 1 required: False

Level 2 required: True

Level 3 required: True

CWE: 295

V9.2.2

Verify that encrypted communications such as TLS is used for all inbound and outbound connections, including for management ports, monitoring, authentication, API, or web service calls, database, cloud, serverless, mainframe, external, and partner connections. The server must not fall back to insecure or unencrypted protocols.

Level 1 required: False

Level 2 required: True

Level 3 required: True

CWE: 319

V9.2.3

Verify that all encrypted connections to external systems that involve sensitive information or functions are authenticated.

Level 1 required: False

Level 2 required: True

Level 3 required: True

CWE: 287

V9.2.4

Verify that proper certification revocation, such as Online Certificate Status Protocol (OCSP) Stapling, is enabled and configured.

Level 1 required: False

Level 2 required: True

Level 3 required: True

CWE: 299

V9.2.5

Verify that backend TLS connection failures are logged.

Level 1 required: False

Level 2 required: False

Level 3 required: True

CWE: 544

Disclaimer:

Credit via OWASP ASVS. For more information visit The OWASP ASVS Project or Github respository.. OWASP ASVS is under the Creative Commons Attribution-Share Alike v3.0 license.

Github logo View source on GitHub

OWASP Cornucopia

  • OWASP Cornucopia is a mechanism in the form of a card game to assist software development teams identify security requirements in Agile, conventional and formal development processes. It is language, platform and technology-agnostic, and is free to use.
  • OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar licence to this one.
  • © 2012-2025 OWASP Foundation. The Open Worldwide Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software.