STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to SEL-2740S NDM Security Technical Implementation Guide

V-92307

CAT II (Medium)

The SEL-2740S must be adopted by OTSDN Controller(s) and obtain its public key certificates from an appropriate certificate policy through an approved service provider.

Rule ID

SV-102395r1_rule

STIG

SEL-2740S NDM Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-000366CCI-001159

Discussion

For user certificates, each organization obtains certificates from an approved, shared service provider, as required by OMB policy. For federal agencies operating a legacy public key infrastructure cross-certified with the Federal Bridge Certification Authority at medium assurance or higher, this Certification Authority will suffice.

Check Content

Ensure the SEL-2740S X.509 certificate is properly configured on the SEL-2740S by checking the "Certificates" page on the OTSDN Controller.  

If the SEL-2740S public keys were not provided by an approved certificate policy or authority, this is a finding.

Fix Text

Import a PEM or PFX X.509 Certificate from an approved service provider into the flow controller as the Root CA certificate so the flow controller can use it to generate and commission the SEL-2740S with an accepted chain of trust.  To do this log into the flow controller with security administrator privileges and navigate to the Administration page and then to the X.509 page.  Select Import and use the certificate type CA Cert.