STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to HPE Alletra Storage ArcusOS Web Server Security Technical Implementation Guide

V-283090

CAT II (Medium)

The HPE Alletra Storage ArcusOS device must utilize trusted and authorized certificates.

Rule ID

SV-283090r1193962_rule

STIG

HPE Alletra Storage ArcusOS Web Server Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-004909

Discussion

Public key infrastructure (PKI) certificates are certificates with visibility external to organizational systems and certificates related to the internal operations of systems, such as application-specific time services. In cryptographic systems with a hierarchical structure, a trust anchor is an authoritative source (e.g., a certificate authority) for which trust is assumed and not derived. A root certificate for a PKI system is an example of a trust anchor. A trust store or certificate store maintains a list of trusted root certificates.

Check Content

Verify the system includes only approved certificates with the following command:

s2475 cli% showcert
Service                      Commonname                                     Type           Enddate                                        Fingerprint
cli*                              lr4-vlan3489-ca.lr4-storage.net    rootca       Mar 27 16:00:17 2034 GMT     741809eb70791ab41d4b695ffef01beb7ea3531e
ekm-client                test-user                                                  cert            Mar 11 10:24:42 2034 GMT    7eae686ffe489b200a4a4bf353db4a0b139043db
ekm-client                CipherTrust Root CA                            rootca       Mar 11 10:24:42 2034 GMT   c2b3e77b89279d830299d60561152b2bedbf6ef6
ekm-server               CipherTrust Root CA                           rootca       Mar 11 10:24:42 2034 GMT    c2b3e77b89279d830299d60561152b2bedbf6ef6
ldap                             lr4-storage-CA                                      rootca       May 31 17:38:44 2032 GMT    409e507985813f294f9c9464e488e46d903f4f58
syslog-sec-client    lr4-vlan3489-ca.lr4-storage.net    rootca       Mar 27 16:00:17 2034 GMT    741809eb70791ab41d4b695ffef01beb7ea3531e
syslog-sec-server   lr4-vlan3489-ca.lr4-storage.net    rootca       Mar 27 16:00:17 2034 GMT    741809eb70791ab41d4b695ffef01beb7ea3531e
wsapi                          lr4-vlan3489-ca.lr4-storage.net    rootca       Mar 27 16:00:17 2034 GMT    741809eb70791ab41d4b695ffef01beb7ea3531e

For each certificate listed above, utilize the system documentation to verify the fingerprint(s) match the authorized certificate(s).

If the fingerprint(s) listed above do not match the certificate(s) listed in the system documentation, this is a finding.

Fix Text

Install the correct certificate for each service using the importcert command.

importcert <SSL_service> [-f] -ca <CA_bundle>