The Edge SWG using PKI-based user authentication must implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.

Severity
Group ID
Group Title
Version
Rule ID
Date
STIG Version
mediumV-279217SRG-NET-000345-ALG-000099SYME-00-009400SV-279217r1170674_rule2025-12-161
Description
Without configuring a local cache of revocation data, there is the potential to allow access to users who are no longer authorized (users with revoked certificates). The intent of this requirement is to require support for a secondary certificate validation method using a locally cached revocation data, such as Certificate Revocation List (CRL), in case access to OCSP (required by CCI-000185) is not available. Based on a risk assessment, an alternate mitigation is to configure the system to deny access when revocation data is unavailable. This requirement applies to ALGs that provide user authentication intermediary services (e.g., authentication gateway or TLS gateway). This does not apply to authentication for the purpose of configuring the device itself (device management).
ℹ️ Check
1. In the Edge SWG Web UI, navigate to the Configuration tab. 2. Navigate to SSL and OCSP. If a responder is not configured, this is a finding. If a responder is configured, but the "Response Cache TTL" is set to "0", this is a finding. If there are any items checked under "Ignore Settings", this is a finding.
✔️ Fix
1. In the Edge SWG Web UI, navigate to the Configuration tab. 2. Go to SSL and OCSP. 3. Click "Add a Responder". 4. Under URL either set it to "from certificate" if routing to the DODIN is allowed, or if it is not, click the other items and add the local site's URL. 5. Under "Issuer CCL", select the one that includes all DOD ID CAs. 6. Under the "Response Cache TTL" is set it to either "from OCSP response" or to a value of 1 or more. 7. Ensure there are no Ignore Settings checked or enabled.