STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Microsoft IIS 10.0 Site Security Technical Implementation Guide

V-218767

CAT II (Medium)

The IIS 10.0 website must only accept client certificates issued by DOD PKI or DOD-approved PKI Certification Authorities (CAs).

Rule ID

SV-218767r1111811_rule

STIG

Microsoft IIS 10.0 Site Security Technical Implementation Guide

Version

V2R15

CCIs

CCI-002470

Discussion

The use of a DOD PKI certificate ensures clients the private website they are connecting to is legitimate, and is an essential part of the DOD defense-in-depth strategy.

Check Content

Note: If the server being reviewed is hosting WSUS, this is not applicable.
Note: If the server is providing OCSP, and not otherwise hosting any content, this requirement is not applicable.

Follow the procedures below for each site hosted on the IIS 10.0 web server:

Open the IIS 10.0 Manager.

Click the site name under review.

Click "Bindings" in the "Action" Pane.

Click the "HTTPS type" from the box.

Click "Edit".

Click "View" and then review and verify the certificate path.

If the list of CAs in the trust hierarchy does not lead to the DOD PKI Root CA, DOD-approved external certificate authority (ECA), or DOD-approved external partner, this is a finding.

If HTTPS is not an available type under site bindings, this is a finding.

If HTTPS is not an available type under site bindings, and the Web Server ONLY communicates directly with a load balancer/proxy server with IP address and Domain Restrictions in place, this is not a finding.

Fix Text

To add DOD Certificates to the Server, if not already present:

Open the IIS 10.0 Manager.

Click the Server name.

Double-click "Server Certificates".

Click "Import" under the "Actions" pane.

Browse to the DOD certificate location, select it, and click "OK".

Remove any non-DOD certificates if present.

Follow the procedures below for each site hosted on the IIS 10.0 web server to bind the certificates to the site:

Click on the site needing the certificate.

Select "Bindings" under the "Actions" pane.

Click on the binding needing a certificate and select "Edit", or add a site binding for HTTPS.

Assign the certificate to the website by choosing it under the "SSL Certificate" drop-down and clicking "OK".