STIGQter STIGQter: STIG Summary: F5 BIG-IP Local Traffic Manager 11.x Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Oct 2020:

The BIG-IP Core implementation must be configured to only allow the use of DoD-approved PKI-established certificate authorities for verification of the establishment of protected sessions.

DISA Rule

SV-215789r557356_rule

Vulnerability Number

V-215789

Group Title

SRG-NET-000355-ALG-000117

Rule Version

F5BI-LT-000213

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the BIG-IP Core to only allow the use of DoD-approved PKI-established certificate authorities for verification of the establishment of protected sessions.

Check Contents

Verify the BIG-IP Core is configured to allow the use of DoD-approved PKI-established certificate authorities for verification of the establishment of protected sessions.

Navigate to the BIG-IP System manager >> System >> File Management >> SSL Certificate List.

Validate that an approved DOD CA Bundle is listed.

If the BIG-IP Core is not configured to use DoD-approved PKI-established certificate authorities for verification of the establishment of protected sessions, this is a finding.

Vulnerability Number

V-215789

Documentable

False

Rule Version

F5BI-LT-000213

Severity Override Guidance

Verify the BIG-IP Core is configured to allow the use of DoD-approved PKI-established certificate authorities for verification of the establishment of protected sessions.

Navigate to the BIG-IP System manager >> System >> File Management >> SSL Certificate List.

Validate that an approved DOD CA Bundle is listed.

If the BIG-IP Core is not configured to use DoD-approved PKI-established certificate authorities for verification of the establishment of protected sessions, this is a finding.

Check Content Reference

M

Target Key

4019

Comments