WG145 IIS7 - The private web server must use an approved DoD certificate validation process.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The Certificate Revocation List (CRL) is used for a number of reasons, for example, when an employee leaves, certificates expire, or if certificate keys become compromised and are reissued. Without the use of a certificate validation process, the server is vulnerable to accepting expired or revoked certificates. This could allow unauthorized individuals access to the web server. The CRL is a repository comprised of revoked certificate data, usually from many contributing CRL sources.
Sites using an Online Certificate Status Protocol (OCSP) rather than CRL download to validate certificates will have obtained and installed an OCSP validation application.

Solution

Using vendor documentation as guidance, reconfigure the web server to utilize certificate with an approved certificate validation process:
netsh http add sslcert

Alternatively, configure existing certificate to validate certifcate revocation:

Open registry, locate HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\HTTP\Parameters\SslBindingInfo\0.0.0.0:443\DefaultSslCertCheckMode
Modify the value to 0
Restart server

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_IIS_7-0_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-17, CAT|II, Rule-ID|SV-32479r3_rule, STIG-ID|WG145_IIS7, Vuln-ID|V-13672

Plugin: Windows

Control ID: 0b521d47311baf7eef4f7ecd1b34a8e1ecde75c9341d895eb634438ba878fcd9