UCF STIG Viewer Logo

Applications must ensure that PKI-based authentication maps the authenticated identity to the user account.


Overview

Finding ID Version Rule ID IA Controls Severity
V-26930 SRG-APP-000177 SV-34210r1_rule Medium
Description
The cornerstone of the PKI is the private key used to encrypt or digitally sign information. The key by itself is a cryptographic value that does not contain specific user information.
STIG Date
Application Security Requirements Guide 2011-12-28

Details

Check Text ( None )
None
Fix Text (None)
None