The operating system must employ PKI solutions at workstations, servers, or mobile computing devices on the network to create, manage, distribute, use, store, and revoke digital certificates.
Severity | Group ID | Group Title | Version | Rule ID | Date | STIG Version |
---|---|---|---|---|---|---|
medium | V-216229 | SRG-OS-000480 | SOL-11.1-090115 | SV-216229r959010_rule | 2024-11-25 | 3 |
Description |
---|
Without the use of PKI systems to manage digital certificates, the operating system or other system components may be unable to securely communicate on a network or reliably verify the identity of a user via digital signatures. |
ℹ️ Check |
---|
The operator will ensure that a DoD approved PKI system is installed, configured, and properly operating. Ask the operator to document the PKI software installation and configuration. If the operator is not able to provide a documented configuration for an installed PKI system or if the PKI system is not properly configured, maintained, or used, this is a finding. |
✔️ Fix |
---|
The operator will ensure that a DoD approved PKI software is installed and operating continuously. |