STIGQter STIGQter: STIG Summary: IBM WebSphere Traditional V9.x Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 23 Aug 2018:

The WebSphere Application Server must use signer for DoD-issued certificates.

DISA Rule

SV-96075r1_rule

Vulnerability Number

V-81361

Group Title

SRG-APP-000177-AS-000126

Rule Version

WBSP-AS-001260

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Obtain the signer certificate either as Base 64 encoded ASCII file, or as binary DER data.

Navigate to Security >> SSl certificate and key management >> SSL Configurations >> CellDefaultSSLSettings >> key stores and certificates.

Click on cell default trust store.

Click on "Signer Certificates".

Click "Add".

Enter a new alias for the signer, and the location of the file that stores signer certificate.

For "Data type", choose the type appropriate for the file, either Base64-encoded ASCII data file, or binary DER data.

Click "OK".

Check Contents

Navigate to Security >> SSl certificate and key management >> SSL Configurations >> CellDefaultSSLSettings >> KeyStores and certificates.

Click on cell default trust store.

Click on "Signer Certificates".

If no DoD root or intermediate certificates are present, this is a finding.

Vulnerability Number

V-81361

Documentable

False

Rule Version

WBSP-AS-001260

Severity Override Guidance

Navigate to Security >> SSl certificate and key management >> SSL Configurations >> CellDefaultSSLSettings >> KeyStores and certificates.

Click on cell default trust store.

Click on "Signer Certificates".

If no DoD root or intermediate certificates are present, this is a finding.

Check Content Reference

M

Target Key

3399

Comments