UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

A private IIS 10.0 website authentication mechanism must use client certificates to transmit session identifier to assure integrity.


Overview

Finding ID Version Rule ID IA Controls Severity
V-218749 IIST-SI-000220 SV-218749r558649_rule Medium
Description
A DoD private website must use PKI as an authentication mechanism for web users. Information systems residing behind web servers requiring authorization based on individual identity must use the identity provided by certificate-based authentication to support access control decisions. Not using client certificates allows an attacker unauthenticated access to private websites. Satisfies: SRG-APP-000172-WSR-000104, SRG-APP-000224-WSR-000135, SRG-APP-000427-WSR-000186
STIG Date
Microsoft IIS 10.0 Site Security Technical Implementation Guide 2021-03-24

Details

Check Text ( C-20222r311145_chk )
Note: If the server being reviewed is a public IIS 10.0 web server, this is Not Applicable.
Note: If certificate handling is performed at the Proxy/Load Balancer, this is not a finding.

Follow the procedures below for each site hosted on the IIS 10.0 web server:

Open the IIS 10.0 Manager.

Double-click the "SSL Settings" icon.

Verify the "Clients Certificate Required" check box is selected.

If the "Clients Certificate Required" check box is not selected, this is a finding.
Fix Text (F-20220r311146_fix)
Note: If the server being reviewed is a public IIS 10.0 web server, this is Not Applicable.
Note: If certificate handling is performed at the Proxy/Load Balancer, this is not a finding.

Follow the procedures below for each site hosted on the IIS 10.0 web server:

Open the IIS 10.0 Manager.

Double-click the "SSL Settings" icon.

Verify the "Clients Certificate Required" check box is selected.

Select "Apply" from the "Actions" pane.