9.3 Ensure 'safkeyringhw:' is set to use a hardware crypto card

Information

Use hardware crypto card to store to store cryptographic keys and certificates.

Using hardware crypto card to store and load cryptographic keys and certificates. Using hardware crypto cards can provide additional security guards against theft. The keys and certificates are used during cryptographic functions like encryption/decryption and also during the SSL/TLS communication.

Solution

For the crypto card configuration, configure the location attribute in the keyStore elements referenced by the SSL configurations to point to a valid hardware crypto keyring configuration and set the type attribute to JCECCARACFKS in ${server.config.dir}/configDropins/overrides/<any file name>.xml

<keyStore id="defaultKeyStore"
location="safkeyringhw:///myHWKeyring"
type="JCECCARACFKS"
...
/>

In addition, make sure that the com.ibm.crypto.hdwrCCA.provider.IBMJCECCA provider is configured in the $JAVA_HOME/jre/lib/security/java.security file.

..
security.provider.3=com.ibm.crypto.hdwrCCA.provider.IBMJCECCA
...

For the hybrid crypto card configuration, configure the location attribute in the keyStore elements referenced by the SSL configurations to point to a valid hybrid hardware crypto keyring configuration and set the type attribute to JCEHYBRIDRACFKS in ${server.config.dir}/configDropins/overrides/<any file name>.xml

<keyStore id="defaultKeyStore"
location="safkeyringhybrid:///myHybridKeyring"
type="JCEHYBRIDRACFKS"
.../>

In addition, configure the com.ibm.crypto.ibmjcehybrid.provider.IBMJCEHYBRID and the com.ibm.crypto.hdwrCCA.provider.IBMJCECCA providers in the $JAVA_HOME/jre/lib/security/java.security file.

..
security.provider.2=com.ibm.crypto.ibmjcehybrid.provider.IBMJCEHYBRID
security.provider.3=com.ibm.crypto.hdwrCCA.provider.IBMJCECCA
...

See Also

https://workbench.cisecurity.org/benchmarks/7724

Item Details

Category: ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|AC-18, 800-53|SC-23, CSCv7|11.5

Plugin: Unix

Control ID: 3ccb758835d5a9528150a3f39e647d26d33c614021eb3dede72e0ceb4f7f5440