STIGQter STIGQter: STIG Summary: Akamai KSD Service Impact Level 2 ALG Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 12 Sep 2017:

Kona Site Defender that provides intermediary services for TLS must be configured to comply with the required TLS settings in NIST SP 800-52.

DISA Rule

SV-91097r1_rule

Vulnerability Number

V-76401

Group Title

SRG-NET-000062-ALG-000150

Rule Version

AKSD-WF-000007

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

Configure Kona Site Defender to only allow NIST SP 800-52 TLS settings:

Contact the Akamai Professional Services team to implement the changes at 1-877-4-AKATEC (1-877-425-2832).

Check Contents

Confirm Kona Site Defender allows only NIST SP 800-52 TLS settings:

1. Navigate to the Qualys SSL Scanner: https://www.ssllabs.com/ssltest/analyze.html
2. Enter into the scanner the Hostname being tested.
3. Under the "Configurations" and then "Protocol" section, verify that communications are restricted to TLS versions 1.2 and above for government-only services or TLS versions 1.0 and above for citizen or business-facing applications.

If Kona Site Defender does not allow only NIST SP 800-52 TLS settings, this is a finding.

Vulnerability Number

V-76401

Documentable

False

Rule Version

AKSD-WF-000007

Severity Override Guidance

Confirm Kona Site Defender allows only NIST SP 800-52 TLS settings:

1. Navigate to the Qualys SSL Scanner: https://www.ssllabs.com/ssltest/analyze.html
2. Enter into the scanner the Hostname being tested.
3. Under the "Configurations" and then "Protocol" section, verify that communications are restricted to TLS versions 1.2 and above for government-only services or TLS versions 1.0 and above for citizen or business-facing applications.

If Kona Site Defender does not allow only NIST SP 800-52 TLS settings, this is a finding.

Check Content Reference

M

Target Key

3165

Comments