UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The DataPower Gateway must map the authenticated identity to the user account for PKI-based authentication.


Overview

Finding ID Version Rule ID IA Controls Severity
V-65103 WSDP-NM-000065 SV-79593r1_rule Medium
Description
Authorization for access to any network device requires an approved and assigned individual account identifier. To ensure only the assigned individual is using the account, the account must be bound to a user certificate when PKI-based authentication is implemented.
STIG Date
IBM DataPower Network Device Management Security Technical Implementation Guide 2016-01-21

Details

Check Text ( C-65731r1_chk )
Search Bar “RBM” >> RBM Settings. Check that the Authentication method list has the User certificate selected. If not, this is a finding.
Fix Text (F-71043r1_fix)
Search Bar “RBM” >> RBM Settings. Click User certificate in the Authentication method list.