STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Database Security Requirements Guide

V-206603

CAT II (Medium)

The DBMS must only accept end entity certificates issued by DOD PKI or DOD-approved PKI Certification Authorities (CAs) for the establishment of all encrypted sessions.

Rule ID

SV-206603r1193220_rule

STIG

Database Security Requirements Guide

Version

V4R5

CCIs

CCI-002470

Discussion

Only DOD-approved external PKIs have been evaluated to ensure that they have security controls and identity vetting procedures in place that are sufficient for DOD systems to rely on the identity asserted in the certificate. PKIs lacking sufficient security controls and identity vetting procedures risk being compromised and risk issuing certificates that enable adversaries to impersonate legitimate users. The authoritative list of DOD-approved PKIs is published at https://www.cyber.mil/pki-pke. This requirement focuses on communications protection for the DBMS session rather than for the network packet.

Check Content

If the DBMS will accept non-DOD approved PKI end-entity certificates, this is a finding.

Fix Text

Revoke trust in any certificates not issued by a DOD-approved certificate authority. Configure the DBMS to accept only DOD and DOD-approved PKI end-entity certificates.