SYMP-AG-000500 - If reverse proxy is used for validating and restricting certs from external entities, and this function is required by the SSP, Symantec ProxySG providing user authentication intermediary services using PKI-based user authentication must only accept end entity certificates issued by DoD PKI or DoD-approved PKI Certification Authorities (CAs) for the establishment of protected sessions.

Information

Non-DoD-approved PKIs have not been evaluated to ensure they have security controls and identity vetting procedures in place that are sufficient for DoD systems to rely on the identity asserted in the certificate. PKIs lacking sufficient security controls and identity vetting procedures risk being compromised and issuing certificates that enable adversaries to impersonate legitimate users.

The authoritative list of DoD-approved PKIs is published at http://iase.disa.mil/pki-pke/interoperability. DoD-approved PKI CAs may include Category I, II, and III certificates. Category I DoD-Approved External PKIs are PIV issuers. Category II DoD-Approved External PKIs are Non-Federal Agency PKIs cross-certified with the Federal Bridge Certification Authority (FBCA). Category III DoD-Approved External PKIs are Foreign, Allied, or Coalition Partner PKIs.

Deploying the ALG with TLS enabled will require the installation of DoD and/or DoD-Approved CA certificates in the trusted root certificate store of each proxy to be used for TLS traffic.

This requirement focuses on communications protection for the application session rather than for the network packet.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Configure reverse proxy services to only trust DoD-approved Certificate Authorities.

1. Log on to the Web Management Console.
2. Browse to Configuration >> Services >> Proxy Services.
3. Browse to SSL >> CA Certificates >> CA Certificate Lists.
4. Click 'Import,' provide a 'Name,' and paste in the first DoD CA certificate in PEM format and click 'OK'. Repeat for each DoD CA certificate desired.
5. Click CA Certificate Lists >> New.
6. Provide a 'Name,' click each DoD CA certificate created in step 4, and click 'Add'. Once all certificates have been added, click 'OK'.
7. Browse to Configuration >> Services >> Proxy Services.
8. Select each HTTPS Reverse Proxy service and click 'Edit Service'.
9. Select the CCL created in step 6, click 'OK,' and then click 'Apply'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SYM_ProxySG_Y20M04_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-23(5), CAT|II, CCI|CCI-002470, Rule-ID|SV-104267r1_rule, STIG-ID|SYMP-AG-000500, Vuln-ID|V-94313

Plugin: BlueCoat

Control ID: fe6e30b1eadafa4b30fc131499f7b5c73f4703fa12841581c8bd26c8dcd90075