2.021 - Software certificate installation files must be removed from a system.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Use of software certificates and their accompanying installation files for end users to access resources is less secure than the use of hardware-based certificates.

Solution

Remove any certificate installation files found on a system.

This does not apply to server-based applications that have a requirement for .p12 certificate files (e.g., Oracle Wallet Manager).

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_7_V1R32_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-12, CAT|II, CCI|CCI-000366, Rule-ID|SV-25004r2_rule, STIG-ID|2.021, Vuln-ID|V-15823

Plugin: Windows

Control ID: 3f8119a7ee7fc633009f1a505b775c6b0dd7c21b060ce88e3ed6a26603ac1ea2