SV-86099r1_rule
V-71475
SRG-NET-000510-ALG-000040
CAGW-GW-000890
CAT II
10
Open the CA API Gateway - Policy Manager.
Double-click each of the Registered Services that requires NIST-FIPS-validated cryptography for digital signatures to be enabled.
Add the following Assertion(s) in accordance with organizational need: "Sign XML Element" and/or "Sign Element".
Verify that the Signature Digest Algorithm is set to SHA-256 or above to meet organizational requirements.
Verify/install an approved public-private keypair in Tasks >> Manage Private Keys.
Also, right-click on the aforementioned Assertions, whenever used, chose "Select Private Key", and verify the appropriate private key is assigned to be used for the signature.
If the "security.fips.enabled" Cluster-Wide Property is not enabled, select "Manage Cluster-Wide Properties" from the "Tasks" menu. Click "Add" and select "security.fips.enabled" from the "Key:" drop-down list.
Set the value to "True" and click "OK".
Open the CA API GW - Policy Manager.
Double-click each of the Registered Services that has the "Sign XML Element” or “Sign Element” Assertions, or require NIST-FIPS-validated cryptography for digital signatures be enabled. Verify that the Signature Digest Algorithm is SHA-256 or above to meet organizational requirements.
Verify that an approved public-private keypair exists in Tasks >> Manage Private Keys. Right-click on the aforementioned Assertions; whenever used, chose "Select Private Key" and verify the appropriate private key is assigned to be used for the signature. Additionally verify that the "security.fips.enabled" Cluster Wide Property is enabled.
If any of the above steps are not met, this is a finding.
V-71475
False
CAGW-GW-000890
Open the CA API GW - Policy Manager.
Double-click each of the Registered Services that has the "Sign XML Element” or “Sign Element” Assertions, or require NIST-FIPS-validated cryptography for digital signatures be enabled. Verify that the Signature Digest Algorithm is SHA-256 or above to meet organizational requirements.
Verify that an approved public-private keypair exists in Tasks >> Manage Private Keys. Right-click on the aforementioned Assertions; whenever used, chose "Select Private Key" and verify the appropriate private key is assigned to be used for the signature. Additionally verify that the "security.fips.enabled" Cluster Wide Property is enabled.
If any of the above steps are not met, this is a finding.
M
3049