The operating system must employ PKI solutions at workstations, servers, or mobile computing devices on the network to create, manage, distribute, use, store, and revoke digital certificates.
Severity | Group ID | Group Title | Version | Rule ID | Date | STIG Version |
|---|---|---|---|---|---|---|
| medium | V-216465 | SRG-OS-000480 | SOL-11.1-090115 | SV-216465r959010_rule | 2025-05-05 | 3 |
| Description |
|---|
| Without the use of PKI systems to manage digital certificates, the operating system or other system components may be unable to securely communicate on a network or reliably verify the identity of a user via digital signatures. |
| ℹ️ Check |
|---|
| The operator will ensure that a DoD approved PKI system is installed, configured, and properly operating. Ask the operator to document the PKI software installation and configuration. If the operator is not able to provide a documented configuration for an installed PKI system or if the PKI system is not properly configured, maintained, or used, this is a finding. |
| ✔️ Fix |
|---|
| The operator will ensure that a DoD approved PKI software is installed and operating continuously. |