UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The External CA Root Certificate must be installed into the Trusted Root Store.


Overview

Finding ID Version Rule ID IA Controls Severity
V-63583 WN10-PK-000010 SV-78073r1_rule Medium
Description
To ensure secure websites protected with ECA server certificates on NIPRNet are properly validated, the system must trust the ECA Root CA 2. The ECA root certificate will ensure the trust chain is established for server certificates issued from the External CA. This requirement only applies to NIPRNet systems.
STIG Date
Windows 10 Security Technical Implementation Guide 2016-06-24

Details

Check Text ( C-64333r1_chk )
Verify the ECA Root CA 2 certificate is installed on NIPRNet systems as a Trusted Root Certification Authority using the Certificates MMC snap-in:

Run "MMC".
Select "File", "Add/Remove Snap-in…".
Select "Certificates", click "Add".
Select "Computer account", click "Next".
Select "Local computer: (the computer this console is running on)", click "Finish".
Click "OK".
Expand "Certificates" and navigate to "Trusted Root Certification Authorities\Certificates".
Search for "ECA Root CA 2" under "Issued To" in the center pane.

If there is no entry for "ECA Root CA 2", this is a finding.

Select "ECA Root CA 2".
Right click and select "Open".
Select the "Details" Tab.
Scroll to the bottom and select "Thumbprint Algorithm".
Verify the Value is "sha1".

If the value for Thumbprint Algorithm is not "sha1", this is a finding.

Next select "Thumbprint".

If the value for the "Thumbprint" field is not "c3:13:f9:19:a6:ed:4e:0e:84:51:af:a9:30:fb:41:9a:20:f1:81:e4", this is a finding.
Fix Text (F-69513r1_fix)
Install the ECA root CA 2 certificate on NIPRNet systems only. The InstallRoot tool is available on IASE at http://iase.disa.mil/pki-pke/function_pages/tools.html.