DISA STIGS Viewer

The web server must only accept client certificates (user and machine) issued by DOD PKI or DOD-approved PKI Certificate Authorities (CAs).

Overview

Finding ID Version Rule ID IA Controls Severity
V-206430 SRG-APP-000427-WSR-000186 SV-206430r965407_rule   Medium
Description
Non-DOD approved PKIs have not been evaluated to ensure that they have security controls and identity vetting procedures in place which are sufficient for DOD systems to rely on the identity asserted in the certificate. PKIs lacking sufficient security controls and identity vetting procedures risk being compromised and issuing certificates that enable adversaries to impersonate legitimate users.
STIG Date
Web Server Security Requirements Guide 2025-02-12

Details

Check Text (C-6691r965406_chk)
If the web server does not provide PKI-based user authentication intermediary services, this is not applicable.

Verify the web server only allows the use of DOD PKI-established CA for verification when establishing sessions.

Verify both user and machine certificates are being validated when establishing sessions.

If the web server does not validate user and machine certificates using DOD PKI-established CAs, this is a finding.
Fix Text (F-6691r962270_fix)
Configure the web server to only allow the use of DOD PKI-established CAs for the session establishment. Configure validation for both the user and machine certificates.