Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-13620 | WG355 | SV-14204r1_rule | Medium |
Description |
---|
A PKI certificate is a digital identifier that establishes the identity of an individual or a platform. A server that has a certificate provides users with third-party confirmation of authenticity. Most web browsers perform server authentication automatically and the user is notified only if the authentication fails. The authentication process between the server and the client is performed using the SSL/TLS protocol. Digital certificates are authenticated, issued, and managed by a trusted Certificate Authority (CA). The use of a trusted certificate validation hierarchy is crucial to the ability to control access to a site’s server and to prevent unauthorized access. Only DoD-approved PKIs will be utilized. |
STIG | Date |
---|---|
IIS 7.0 Server STIG | 2019-03-22 |
Check Text ( C-30028r1_chk ) |
---|
Enter the following command: find / -name ssl.conf note the path of the file. grep "SSLCACertifcateFile" /path/of/ssl.conf file. Review the results to determine the path of the SSLCACertifcateFile. more /path/of/ca-bundle.crt file. Examine the contents of this file to determine if the trusted CAs are DoD approved. If the trusted CAs that are used to authenticate users to the web site does not lead to an approved DoD CA, then this is a finding. NOTE: There are non DoD roots that must be on the server in order for it to function. Some applications, such as anti-virus programs, require root CAs to function. DoD approved certificate can include the External Certficiate Authorities (ECA), if approved by the DAA. The PKE InstallRoot 3.06 System Administrator Guide (SAG), dated 8 Jul 2008, contains a complete list of DoD, ECA, and IECA CAs. |
Fix Text (F-26868r1_fix) |
---|
Configure the web server’s trust store to trust only DoD-approved PKIs (e.g., DoD PKI, DoD ECA, and DoD-approved external partners). |