WN12-PK-000006-DC - Domain Controller PKI certificates must be issued by the DoD PKI or an approved External Certificate Authority (ECA).

Information

A PKI implementation depends on the practices established by the Certificate Authority (CA) to ensure the implementation is secure. Without proper practices, the certificates issued by a CA have limited value in authentication functions. The use of multiple CAs from separate PKI implementations results in interoperability issues. If servers and clients do not have a common set of root CA certificates, they are not able to authenticate each other.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Obtain PKI certificates issued by the DoD PKI or an approved External Certificate Authority (ECA).

Severity Override Guidance: If the certificates in use are issued by a CA authorized by the Component's CIO, this is a CAT II finding.

IA Controls: IAKM-1, IAKM-2, IATS-1, IATS-2

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_2012_and_2012_R2_DC_V3R7_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(2)(a), CAT|I, CCI|CCI-000185, Rule-ID|SV-226265r794525_rule, STIG-ID|WN12-PK-000006-DC, STIG-Legacy|SV-51190, STIG-Legacy|V-14820, Vuln-ID|V-226265

Plugin: Windows

Control ID: f8edb7a66738c9e44a10d2e4d5b7e70e67a28258f943ac443104f81d1fee9e62