STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Apache Tomcat Application Server 9 Security Technical Implementation Guide

V-222931

CAT I (High)

Default password for keystore must be changed.

Rule ID

SV-222931r1137578_rule

STIG

Apache Tomcat Application Server 9 Security Technical Implementation Guide

Version

V3R4

CCIs

CCI-000186, CCI-000213

Discussion

Tomcat currently operates only on JKS, PKCS11, or PKCS12 format keystores. The JKS format is Java's standard "Java KeyStore" format, and is the format created by the keytool command-line utility which is included in the JDK. The PKCS12 format is an internet standard, and is managed using OpenSSL or Microsoft's Key-Manager. This requirement only applies to JKS keystores. When a new JKS keystore is created, if a password is not specified during creation the default password used by Tomcat is "changeit" (all lower case). If the default password is not changed, the keystore is at risk of compromise. Satisfies: SRG-APP-000033-AS-000023, SRG-APP-000176-AS-000125

Check Content

From the Tomcat server console, run the following command to check the keystore:

sudo keytool -list -v 

When prompted for the keystore password type "changeit" sans quotes.

If the contents of the keystore are displayed, this is a finding.

Fix Text

From the Tomcat server as a privileged user, run the following command:

sudo keytool -storepasswd 

When prompted for the keystore password, select a strong password, minimum 10 characters, mixed case alpha-numeric.

Document the password and store in a secured location that is only accessible to authorized personnel.