UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The ICS must be configured to obtain its public key certificates from an appropriate certificate policy through an approved service provider.


Overview

Finding ID Version Rule ID IA Controls Severity
V-258611 IVCS-NM-000370 SV-258611r961863_rule Medium
Description
For user certificates, each organization obtains certificates from an approved and shared service provider, as required by OMB policy. For federal agencies operating a legacy public key infrastructure cross-certified with the Federal Bridge Certification Authority at medium assurance or higher, this Certification Authority will suffice.
STIG Date
Ivanti Connect Secure NDM Security Technical Implementation Guide 2024-06-10

Details

Check Text ( C-62351r930519_chk )
In the ICS Web UI, navigate to System >> Configuration >> Certificates >> Device Certificates.

1. Verify there is a device certificate that is signed by a valid DOD CA.
2. Verify the certificate is used by all interfaces on the ICS.

If the ICS does not obtain its public key certificates from an appropriate certificate policy through an approved service provider, this is a finding.
Fix Text (F-62260r930520_fix)
In the ICS Web UI, navigate to System >> Configuration >> Certificates >> Device Certificates.
1. Click "New CSR".
2. Add a Common Name in FQDN format.
3. Add a Country code of US.
4. Under key type, if using RSA, select "RSA". If using ECC, select "ECC".
5. Under the key length, if using RSA, select at least "2048". If using ECC, select "P-384".
6. Type in "Random Data" in the text field.
7. Click "Create CSR".
8. Copy the Base 64/PEM encoded certificate request that is shown on the screen and paste it to a text file. Ensure the file has the file suffix of .csr.
9. Go through the local RA process for DOD Web Server certificate requests. Ensure that SANs are added to the certificate by the issuing CA to include the hostname, cluster names, and all FQDNs.
10. Once the certificate is provided by the CA, go to System >> Configuration >> Certificates >> Device Certificates.
11. Click "Browse" and select the certificate file issued by the CA, then click "Import".
12. Click "Save Changes".
13. Click on the imported certificate.
14. On the "Internal Port", click "add" for the cluster internal VIP and .
15. On the "External Port", click "add" for the cluster external VIP and .
16. Check the box for "Management Port".
17. Under "Certificate Status Checking", click the box for "Use CRLs".
18. Click "Save Changes".