Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-71315 | CAGW-GW-000190 | SV-85939r1_rule | Medium |
Description |
---|
SP 800-52 provides guidance on using the most secure version and configuration of the TLS/SSL protocol. Using older unauthorized versions or incorrectly configuring protocol negotiation makes the Gateway vulnerable to known and unknown attacks that exploit vulnerabilities in this protocol. SP 800-52 sets TLS version 1.1 as a minimum version; thus, all versions of SSL are not allowed (including for client negotiation) on either DoD-only or public-facing servers. The CA API Gateway must be configured to use FIPS-140 cryptographic algorithms to meet the NIST SP 800-52 TLS settings. |
STIG | Date |
---|---|
CA API Gateway ALG Security Technical Implementation Guide | 2017-04-07 |
Check Text ( C-71711r1_chk ) |
---|
Open the CA API Gateway - Policy Manager. Select "Manage Cluster-Wide Properties" from the "Tasks" menu. If the "security.fips.enabled" property is not listed or is set to false, this is a finding. |
Fix Text (F-77625r1_fix) |
---|
Open the CA API Gateway - Policy Manager. Select "Manage Cluster-Wide Properties" from the "Tasks" menu. Click "Add" and select "security.fips.enabled" from the "Key:" drop-down list. Set the value to "true" and click "OK". |