|Finding ID||Version||Rule ID||IA Controls||Severity|
|Certificates may be revoked due to improper issuance, compromise of the certificate, and failure to adhere to policy. Therefore, any certificate found revoked on a CRL or via Online Certificate Status Protocol (OCSP) should not be trusted. Permitting execution of an applet published with a revoked certificate may result in spoofing, malware, system modification, invasion of privacy, and denial of service. Ensuring users cannot change these settings assures a more consistent security profile. NOTE: The 'JRE' directory in the file path may reflect the specific JRE release installed.|
|Java Runtime Environment (JRE) version 7 STIG for Unix||2015-12-10|
|Check Text ( C-41480r13_chk )|
| If the system is on the SIPRNET, this requirement is NA. |
Navigate to the system 'deployment.properties' file for Java, the default location is
If the 'deployment.security.validation.crl.locked' key is not present within the deployment.properties file, this is a finding.
If the 'deployment.security.validation.ocsp.locked' key is not present within the deployment.properties file, this is a finding.
|Fix Text (F-37120r12_fix)|
| Navigate to the system 'deployment.properties' file for Java, the default location is |
Add the 'deployment.security.validation.crl.locked' key to the deployment.properties file.
Add the 'deployment.security.validation.ocsp.locked' key to the deployment.properties file.