OH12-1X-000303 - OHS must use wallets that have only DoD certificate authorities defined.

Information

Non-DoD approved PKIs have not been evaluated to ensure that they have security controls and identity vetting procedures in place which are sufficient for DoD systems to rely on the identity asserted in the certificate. PKIs lacking sufficient security controls and identity vetting procedures risk being compromised and issuing certificates that enable adversaries to impersonate legitimate users.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

1. Go to the location of the OHS keystores (e.g., cd $DOMAIN_HOME/config/fmwconfig/components/OHS/<componentName>/keystores).

2. For each wallet directory located there, do the following:

a) Issue the command '$ORACLE_HOME/oracle_common/bin/orapki wallet display -wallet <wallet_directory>'.
b) Remove each Trusted Certificate from the wallet that is not an appropriate DoD Certificate Authority with the command '$ORACLE_HOME/oracle_common/bin/orapki wallet remove -wallet <wallet_directory> -dn <dn_of_the_trusted_certificate> -trusted_cert'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_HTTP_Server_12-1-3_V2R2_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-23(5), CAT|II, CCI|CCI-002470, Rule-ID|SV-221518r879798_rule, STIG-ID|OH12-1X-000303, STIG-Legacy|SV-79017, STIG-Legacy|V-64527, Vuln-ID|V-221518

Plugin: Unix

Control ID: 68365757620788ea7a6a9271a0023962d70a218ff9b3b04491a91f51decc213b