F5BI-DM-300044 - The F5 BIG-IP appliance must obtain its public key certificates from an appropriate certificate policy through an approved service provider.

Information

For user certificates, each organization obtains certificates from an approved, shared service provider, as required by OMB policy. For federal agencies operating a legacy public key infrastructure cross-certified with the Federal Bridge Certification Authority at medium assurance or higher, this Certification Authority (CA) will suffice.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

From the BIG-IP GUI:
1. System.
2. Certificate Management.
3. Device Certificate Management.
4. Device Certificate Signing Request.
5. Click "Renew".
6. Select "Certificate Authority" in "Issuer" and complete the form.
7. Copy or download and submit CSR to an approved CA.
8. Import the certificate via Device Certificate Management >> Device Certificate >> Import.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_F5_BIG-IP_TMOS_Y25M07_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|CM-6b., 800-53|SC-17, CAT|II, CCI|CCI-000366, CCI|CCI-001159, Rule-ID|SV-266083r1024615_rule, STIG-ID|F5BI-DM-300044, Vuln-ID|V-266083

Plugin: F5

Control ID: edba1fc52b30d338eba7db360300cedef16568540ab7fda5e00735e3bba369de