CISC-ND-001440 - The Cisco router must be configured to obtain its public key certificates from an appropriate certificate policy through an approved service provider - crypto pki trustpoint

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

For user certificates, each organization obtains certificates from an approved, shared service provider, as required by OMB policy. For federal agencies operating a legacy public key infrastructure cross-certified with the Federal Bridge Certification Authority (CA) at medium assurance or higher, this Certification Authority will suffice.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Configure the router to obtain its public key certificates from an appropriate certificate policy through an approved service provider as show in the example below.

RP/0/0/CPU0:R3(config)#crypto ca trustpoint CA_X
RP/0/0/CPU0:R3(config-trustp)#enrollment url http://trustpoint1.example.com

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Cisco_IOS-XR_Router_Y21M04_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|CM-6, 800-53|SC-17, CAT|II, CCI|CCI-000366, CCI|CCI-001159, Rule-ID|SV-216546r531088_rule, STIG-ID|CISC-ND-001440, STIG-Legacy|SV-105633, STIG-Legacy|V-96495, Vuln-ID|V-216546

Plugin: Cisco

Control ID: 3b178a3199ee5ea7d2c5c79f3eb363197f5eee695e14ae18249ded938f9c1163