APPNET0031 - Digital signatures assigned to strongly named assemblies must be verified.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

A strong name consists of the assembly's identity, simple text name, version number, and culture information (if provided)-plus a public key and a digital signature. Strong names serve to identify the author of the code. If digital signatures used to sign strong name assemblies are not verified, any self signed code can be impersonated. This can lead to a loss of system integrity.

Solution

Use regedit to remove the values stored in Windows registry key HKLM\Software\Microsoft\StrongName\Verification. There should be no assemblies or hash values listed under this registry key.

All assemblies must require strong name verification in a production environment.

Strong name assemblies that do not require verification in a development or test environment must have documented approvals from the IAO.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_DotNet_Framework_4-0_V2R3_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000185, Rule-ID|SV-225223r879612_rule, STIG-ID|APPNET0031, STIG-Legacy|SV-7438, STIG-Legacy|V-7055, Vuln-ID|V-225223

Plugin: Windows

Control ID: c4a903ce7ec7ea704594fa978742896694ca435d80160903d8448536cc6801c7