WG340 W22 - A private web server must utilize an approved TLS version. - 'SSLEngine'

Information

Transport Layer Security (TLS) encryption is a required security setting for a private web server. Encryption of private information is essential to ensuring data confidentiality. If private information is not encrypted, it can be intercepted and easily read by an unauthorized party. A private web server must use a FIPS 140-2 approved TLS version, and all non-FIPS-approved SSL versions must be disabled.
FIPS 140-2 approved TLS versions include TLS V1.0 or greater. NIST SP 800-52 specifies the preferred configurations for government systems.
The SSLProtocol directive enables or disables SSL/TLS protocols. 'SSLProtocol ALL' is a shortcut for enabling SSLv3 and TLSv1 but does not disable lower versions of SSL. Since some Apache versions enable SSL by default, SSL needs to be explicitly disabled, while also enabling TLS. To disable specific SSL Protocols, the -SSLv3 -SSLv2 switches are used with the SSLProtocol directive.

Solution

Edit the httpd.conf file and set the SSLProtocol to include '-SSLv2 -SSLv3' and the SSLEngine to 'On'. For Apache 2.2.22 and older, set SSLProtocol to 'TLSv1' or higher.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Apache_2-2_WIN_V1R13_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-8(1), CAT|II, Rule-ID|SV-14297r3_rule, STIG-ID|WG340_W22, Vuln-ID|V-2262

Plugin: Windows

Control ID: 12076d66973b83c0298372b7561e50d036958c7314b81e79521d5959ee81ac21