IIST-SI-000242 - The IIS 10.0 private website must employ cryptographic mechanisms (TLS) and require client certificates.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

TLS encryption is a required security setting for a private web server. Encryption of private information is essential to ensuring data confidentiality. If private information is not encrypted, it can be intercepted and easily read by an unauthorized party. A private web server must use a FIPS 140-2-approved TLS version, and all non-FIPS-approved SSL versions must be disabled.

NIST SP 800-52 specifies the preferred configurations for government systems.

Solution

Note: If SSL is installed on load balancer/proxy server through which traffic is routed to the IIS 10.0 server, and the IIS 10.0 server receives traffic from the load balancer/proxy server, the SSL requirement must be met on the load balancer/proxy server. In this case, this requirement is Not Applicable.
Note: If this is a public-facing web server, this requirement is Not Applicable.
Note: If this server is hosting WSUS, this requirement is Not Applicable.
Note: If the server being reviewed is hosting SharePoint, this is Not Applicable.

Follow the procedures below for each site hosted on the IIS 10.0 web server:

Open the IIS 10.0 Manager.

Double-click the 'SSL Settings' icon under the 'IIS' section.

Select the 'Require SSL' setting.

Select the 'Client Certificates Required' setting.

Click 'Apply' in the 'Actions' pane.

Click the site under review.

Select 'Configuration Editor' under the 'Management' section.

From the 'Section:' drop-down list at the top of the configuration editor, locate 'system.webServer/security/access'.

Click on the drop-down list for 'sslFlags'.

Select the 'Ssl128' check box.

Click 'Apply' in the 'Actions' pane.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_IIS_10-0_Y24M07_STIG.zip

Item Details

References: CAT|II, CCI|CCI-002476, Rule-ID|SV-218768r879800_rule, STIG-ID|IIST-SI-000242, STIG-Legacy|SV-109361, STIG-Legacy|V-100257, Vuln-ID|V-218768

Plugin: Windows

Control ID: 1f8f7d7ddc8726f4cfa977d64f5978d1629f999a1d013889887802f7c3cb491d