UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The mobile device operating system must have access to DoD root and intermediate PKI certificates when performing DoD PKI-related transactions.


Overview

Finding ID Version Rule ID IA Controls Severity
V-48255 KNOX-22-013200 SV-61127r1_rule Medium
Description
DoD root and intermediate PKI certificates are used to verify the authenticity of PKI certificates of users and web services. If the root and intermediate certificates are not available, an adversary could falsely sign a certificate in such a way that it could not be detected. Providing access to the DoD root and intermediate PKI certificates greatly diminishes the risk of this attack. SFR ID: FMT_SMF.1.1 #13
STIG Date
Samsung Android (with Knox 1.x) STIG 2014-04-22

Details

Check Text ( C-50687r5_chk )
This validation procedure is performed on both the MDM Administration Console and the Samsung Knox Android device.

The current DoD root and intermediate PKI certificates may be obtained in self-extracting zip files at http://iase.disa.mil/pki-pke (for NIPRNET) or
http://iase.rel.disa.smil.mil/pki-pke/function_pages/tools.html (for SIPRNET).

Check whether the appropriate setting is configured on the MDM Administration Console:
1. Ask the MDM administrator to display the list of server authentication certificates in the "Android Certificate Configuration" rule.
2. Verify the DoD root and intermediate PKI certificates are present.

On the Samsung Knox Android device:
1. Open the device settings.
2. Select "Security".
3. Select "Trusted Credentials".
4. Review Certificate Authorities listed under the "System" and "User" tabs.
5. Verify the presence of the DoD root and intermediate certificates.

If the DoD root and intermediate certificates are not present in the MDM Console whitelist or on the device, this is a finding.
Fix Text (F-51863r4_fix)
Install DoD root and intermediate certificates on the device.

On the MDM Console, add the PEM encoded representations of the DoD root and intermediate certificates to the certificate whitelist in the "Android Certificate Configuration" rule.

The current DoD root and intermediate PKI certificates may be obtained in self-extracting zip files at http://iase.disa.mil/pki-pke (for NIPRNET) or
http://iase.rel.disa.smil.mil/pki-pke/function_pages/tools.html (for SIPRNET).