OH12-1X-000321 - OHS must have the SSLFIPS directive enabled to maintain the confidentiality of controlled information during transmission through the use of an approved TLS version.

Information

Transport Layer Security (TLS) is a required transmission protocol for a web server hosting controlled information. The use of TLS provides confidentiality of data in transit between the web server and client. FIPS 140-2 approved TLS versions must be enabled and non-FIPS-approved SSL versions must be disabled.

NIST SP 800-52 defines the approved TLS versions for government applications.

Solution

1. Open $DOMAIN_HOME/config/fmwconfig/components/OHS/<componentName>/ssl.conf with an editor.

2. Search for the 'SSLFIPS' directive at the OHS server configuration scope.

3. Set the 'SSLFIPS' directive to 'On', add the directive if it does not exist.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_HTTP_Server_12-1-3_V2R2_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-8, CAT|II, CCI|CCI-002418, Rule-ID|SV-221529r879810_rule, STIG-ID|OH12-1X-000321, STIG-Legacy|SV-79049, STIG-Legacy|V-64559, Vuln-ID|V-221529

Plugin: Unix

Control ID: 21dd28c241cc918893c11c48edf5d0c91bce62767f3a84fb0f95a8a09ce1c1ea