IIST-SI-000220 - A private IIS 10.0 website authentication mechanism must use client certificates to transmit session identifier to assure integrity.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

A DoD private website must use PKI as an authentication mechanism for web users. Information systems residing behind web servers requiring authorization based on individual identity must use the identity provided by certificate-based authentication to support access control decisions. Not using client certificates allows an attacker unauthenticated access to private websites.

Satisfies: SRG-APP-000172-WSR-000104, SRG-APP-000224-WSR-000135, SRG-APP-000427-WSR-000186

Solution

Note: If the server being reviewed is a public IIS 10.0 web server, this is Not Applicable.
Note: If the server being reviewed is hosting SharePoint, this is Not Applicable.
Note: If certificate handling is performed at the Proxy/Load Balancer, this is Not Applicable.

Follow the procedures below for each site hosted on the IIS 10.0 web server:

Open the IIS 10.0 Manager.

Double-click the 'SSL Settings' icon.

Verify the 'Clients Certificate Required' check box is selected.

Select 'Apply' from the 'Actions' pane.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_IIS_10-0_Y23M01_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000197, CCI|CCI-001188, CCI|CCI-002470, Rule-ID|SV-218749r850584_rule, STIG-ID|IIST-SI-000220, STIG-Legacy|SV-109323, STIG-Legacy|V-100219, Vuln-ID|V-218749

Plugin: Windows

Control ID: 0be86f4fe694583f8ae0e116e7d5c86176139c18a0690faf6f632b0eabaa1d37