IBMW-LS-000500 - The WebSphere Liberty Server must use DoD-issued/signed certificates.

Information

The cornerstone of PKI is the private key used to encrypt or digitally sign information. The key by itself is a cryptographic value that does not contain specific user information, but the key can be mapped to a user. Without mapping the certificate used to authenticate to the user account, the ability to determine the identity of the individual user or group will not be available for forensic analysis.

Satisfies: SRG-APP-000177-AS-000126, SRG-APP-000427-AS-000264, SRG-APP-000514-AS-000137

Solution

Do not use self-signed certificates in a production environment. Only import certificates signed by an authorized DoD CA or authorized for DoD use.

Obtain the signer certificate either as a Base 64-encoded ASCII file or as binary DER data.

Using the JDK's ikeyman or keytool utility, open the default trusted keystore specified in the ${server.config.dir}/server.xml.

Click on signer certificates and import the file that contains the DoD signed certificate.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_IBM_WebSphere_Liberty_Server_V2R2_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|IA-5(2)(c), 800-53|SC-13, 800-53|SC-23(5), CAT|II, CCI|CCI-000187, CCI|CCI-002450, CCI|CCI-002470, Rule-ID|SV-250338r961044_rule, STIG-ID|IBMW-LS-000500, Vuln-ID|V-250338

Plugin: Unix

Control ID: 1aa47021f00905efc4f23b30a0bbf709046faa2977aa9dd1263b8d63e64effbd