UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The IIS 10.0 web server must maintain the confidentiality of controlled information during transmission through the use of an approved Transport Layer Security (TLS) version.


Overview

Finding ID Version Rule ID IA Controls Severity
V-218822 IIST-SV-000154 SV-218822r561041_rule Medium
Description
TLS is a required transmission protocol for a web server hosting controlled information. The use of TLS provides confidentiality of data in transit between the web server and client. FIPS 140-2-approved TLS versions must be enabled and non-FIPS-approved SSL versions must be disabled. NIST SP 800-52 defines the approved TLS versions for government applications.
STIG Date
Microsoft IIS 10.0 Server Security Technical Implementation Guide 2020-09-25

Details

Check Text ( C-20294r310941_chk )
Review the web server documentation and deployed configuration to determine which version of TLS is being used.

If the TLS version is not TLS 1.2 or higher, according to NIST SP 800-52, or if non-FIPS-approved algorithms are enabled, this is a finding.
Fix Text (F-20292r310942_fix)
Configure the web server to use an approved TLS version according to NIST SP 800-52 and to disable all non-approved versions.