IISW-SI-000242 - The IIS 8.5 private website must employ cryptographic mechanisms (TLS) and require client certificates.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

TLS encryption is a required security setting for a private web server. Encryption of private information is essential to ensuring data confidentiality. If private information is not encrypted, it can be intercepted and easily read by an unauthorized party. A private web server must use a FIPS 140-2-approved TLS version, and all non-FIPS-approved SSL versions must be disabled.

NIST SP 800-52 specifies the preferred configurations for government systems.

Solution

Note: If this is a public facing web server, this requirement is Not Applicable.
Note: If the server is hosting SharePoint, this is Not Applicable.
Note: If this server is hosting WSUS, this requirement is Not Applicable.

Follow the procedures below for each site hosted on the IIS 8.5 web server:

Open the IIS 8.5 Manager.

Double-click the 'SSL Settings' icon under the 'IIS' section.

Select the 'Require SSL' setting.

Select the 'Client Certificates Required' setting.

Click 'Apply' in the 'Actions' pane.

Click the site under review.

Select 'Configuration Editor' under the 'Management' section.

From the 'Section:' drop-down list at the top of the configuration editor, locate 'system.webServer/security/access'.

Click on the drop-down list for 'sslFlags'.

Select the 'Ssl128' check box.

Click 'Apply' in the 'Actions' pane.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_IIS_8-5_Y22M01_STIG.zip

Item Details

References: CAT|II, CCI|CCI-002476, Rule-ID|SV-214480r802883_rule, STIG-ID|IISW-SI-000242, STIG-Legacy|SV-91547, STIG-Legacy|V-76851, Vuln-ID|V-214480

Plugin: Windows

Control ID: 60c0d34a89eb43dd79cd12d0789b7f851893bbe2bd4e4942c88daf391464bb95