IISW-SI-000220 - A private websites authentication mechanism must use client certificates to transmit session identifier to assure integrity.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

A DoD private website must utilize PKI as an authentication mechanism for web users. Information systems residing behind web servers requiring authorization based on individual identity must use the identity provided by certificate-based authentication to support access control decisions. Not using client certificates allows an attacker unauthenticated access to private websites.

Satisfies: SRG-APP-000172-WSR-000104, SRG-APP-000224-WSR-000135, SRG-APP-000427-WSR-000186

Solution

Note: If the server being reviewed is a public IIS 8.5 web server, this is Not Applicable.
Note: If the server is hosting Exchange, this is Not Applicable.
Note: If certificate handling is performed at the Proxy/Load Balancer, this is not a finding.

Follow the procedures below for each site hosted on the IIS 8.5 web server:

Open the IIS 8.5 Manager.
Double-click the 'SSL Settings' icon.
Verify the 'Clients Certificate Required' check box is selected.
Select 'Apply' from the 'Actions' pane.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_IIS_8-5_Y22M01_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000197, CCI|CCI-001188, CCI|CCI-002470, Rule-ID|SV-214460r802880_rule, STIG-ID|IISW-SI-000220, STIG-Legacy|SV-91505, STIG-Legacy|V-76809, Vuln-ID|V-214460

Plugin: Windows

Control ID: 7e0e1496599f1bc50bf3fe4a457399fd7e6695553db1dad88c65f90bf910be98