STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to IBM WebSphere Traditional V9.x Security Technical Implementation Guide

V-255889

CAT II (Medium)

The WebSphere Application Server distribution and consistency services (DCS) transport links must be encrypted.

Rule ID

SV-255889r961863_rule

STIG

IBM WebSphere Traditional V9.x Security Technical Implementation Guide

Version

V2R1

CCIs

CCI-002420CCI-000366

Discussion

A Core Group (HA Domain) is a component of the high availability manager function. It can contain stand-alone servers, cluster members, node agents, administrative agents, and the deployment manager. Core groups rely on DCS, which uses a reliable multicast message (RMM) system for transport. RMM can use one of several wire transport technologies. Depending on your environment, sensitive information might be transmitted over DCS. For example, data in DynaCache and the security subject cache are transmitted using DCS. To ensure this, select a transport type of channel framework and DCS-Secure as channel chain for each core group. Be aware that DCS always authenticates messages when global security is enabled. Once the transport is encrypted, you then have a highly secure channel. Once you have done this, all services that rely on DCS are now using an encrypted and authenticated transport. Those services are DynaCache, memory-to-memory session replication, core groups, Web services caching, and stateful session bean persistence.

Check Content

From the admin console navigate to Servers >> Core groups.

For every Core Group listed, select the Core Group [CoreGroup Name]. 

Under "Transport Type", select the "Channel Framework" button.

If the "transport chain" drop down box is not set to "DCS-Secure", this is a finding.

Fix Text

From the admin console navigate to Core groups >> for every Core Group listed.

Select the [Core Group Name].

Under "Transport" type, select "CHANNEL_FRAMEWORK" button.

In the "Transport chain" drop down box set to "DCS-SECURE".

Click "Save".

Sync the configuration.