OH12-1X-000299 - OHS must have the SSLFIPS directive enabled so SSL requests can be processed with client certificates only issued by DoD PKI or DoD-approved PKI Certification Authorities (CAs).

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Non-DoD approved PKIs have not been evaluated to ensure that they have security controls and identity vetting procedures in place which are sufficient for DoD systems to rely on the identity asserted in the certificate. PKIs lacking sufficient security controls and identity vetting procedures risk being compromised and issuing certificates that enable adversaries to impersonate legitimate users.

Solution

1. Open $DOMAIN_HOME/config/fmwconfig/components/OHS/<componentName>/ssl.conf with an editor.

2. Search for the 'SSLFIPS' directive at the OHS server configuration scope.

3. Set the 'SSLFIPS' directive to 'On', add the directive if it does not exist.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_HTTP_Server_12-1-3_V2R1_STIG.zip

Item Details

References: CAT|II, CCI|CCI-002470, Rule-ID|SV-221514r415223_rule, STIG-ID|OH12-1X-000299, STIG-Legacy|SV-79009, STIG-Legacy|V-64519, Vuln-ID|V-221514

Plugin: Unix

Control ID: bdba065b00400333d8367bed78f7b7c116f55c1a817916bdadf49f5266b5a98d