IIST-SI-000220 - A private IIS 10.0 website authentication mechanism must use client certificates to transmit session identifier to assure integrity.

Information

A DoD private website must use PKI as an authentication mechanism for web users. Information systems residing behind web servers requiring authorization based on individual identity must use the identity provided by certificate-based authentication to support access control decisions. Not using client certificates allows an attacker unauthenticated access to private websites.

Satisfies: SRG-APP-000172-WSR-000104, SRG-APP-000224-WSR-000135, SRG-APP-000427-WSR-000186

Solution

Note: If the server being reviewed is a public IIS 10.0 web server, this is Not Applicable.
Note: If certificate handling is performed at the Proxy/Load Balancer, this is not a finding.

Follow the procedures below for each site hosted on the IIS 10.0 web server:

Open the IIS 10.0 Manager.

Double-click the 'SSL Settings' icon.

Verify the 'Clients Certificate Required' check box is selected.

Select 'Apply' from the 'Actions' pane.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_IIS_10-0_Y20M10_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(2), CAT|II, CCI|CCI-000197, CCI|CCI-001188, CCI|CCI-002470, Rule-ID|SV-218749r558649_rule, STIG-ID|IIST-SI-000220, STIG-Legacy|SV-109323, STIG-Legacy|V-100219, Vuln-ID|V-218749

Plugin: Windows

Control ID: 16e5f8896a85eb440f13ba935fdba2d32d51375f401b5b7047c6870a6e2c599d