UCF STIG Viewer Logo

The WebSphere Application Server DoD root CAs must be in the trust store.


Overview

Finding ID Version Rule ID IA Controls Severity
V-81373 WBSP-AS-001410 SV-96087r1_rule Medium
Description
This control focuses on communications protection at the session, versus packet level. At the application layer, session IDs are tokens generated by web applications to uniquely identify an application user's session. Web applications utilize session tokens or session IDs in order to establish application user identity. Proper use of session IDs addresses man-in-the-middle attacks, including session hijacking or insertion of false information into a session. Application servers must provide the capability to perform mutual authentication. Mutual authentication is when both the client and the server authenticate each other.
STIG Date
IBM WebSphere Traditional V9.x Security Technical Implementation Guide 2018-08-24

Details

Check Text ( C-81083r1_chk )
Review System Security Plan documentation for location of the trust store used to store the signers of the administrators certificates. By default this is "cellDefaultTrustStore".

Navigate to Security >> SSL certificate and key management >> Keystore and certificates.

Click on the trust store used to store the signers of the administrators' certificates (root CA). (The default is cellDefaultTrustStore).

Click on "Signer Certificates".

If there are no DoD signer certificates, this is a finding.
Fix Text (F-88159r1_fix)
Navigate to Security >> SSL certificate and key management >> Keystore and certificates.

Click on the trust store used to store the signers of the administrators' certificates. (The default is cellDefaultTrustStore).

Click on "Signer Certificates".

Click "Add".

Follow the instructions to import the signer from a file.

Click "OK".