JRE8-WN-000160 - JRE 8 must lock the option to enable users to check publisher certs for revocation - deployment.security.revocation.check

Information

Certificates may be revoked due to improper issuance, compromise of the certificate, and failure to adhere to policy. Therefore, any certificate found revoked on a CRL or via Online Certificate Status Protocol (OCSP) should not be trusted. Permitting execution of an applet published with a revoked certificate may result in spoofing, malware, system modification, invasion of privacy, and denial of service.

Ensuring users cannot change these settings assures a more consistent security profile.

Solution

If the system is on the SIPRNet, this requirement is NA.

Navigate to the system-level 'deployment.properties' file for JRE.

The location of the deployment.properties file is defined in <JRE Installation Directory>\Lib\deployment.config

Add the key 'deployment.security.revocation.check=ALL_CERTIFICATES' to the deployment.properties file.

Add the key 'deployment.security.revocation.check.locked' to the deployment.properties file.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Oracle_JRE_8_Windows_V1R5_STIG.zip

Item Details

Category: ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|AC-6, 800-53|SC-23(5), CAT|II, CCI|CCI-001991, Rule-ID|SV-81213r1_rule, STIG-ID|JRE8-WN-000160, Vuln-ID|V-66723

Plugin: Windows

Control ID: bb7f46ee34a21bdd7b0a7720fc4c236284005dd782bdf6cf4af6b78fe6dcad25