STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Symantec Edge SWG ALG Security Technical Implementation Guide

V-279217

CAT II (Medium)

The Edge SWG using PKI-based user authentication must implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.

Rule ID

SV-279217r1170674_rule

STIG

Symantec Edge SWG ALG Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-004068

Discussion

Without configuring a local cache of revocation data, there is the potential to allow access to users who are no longer authorized (users with revoked certificates). The intent of this requirement is to require support for a secondary certificate validation method using a locally cached revocation data, such as Certificate Revocation List (CRL), in case access to OCSP (required by CCI-000185) is not available. Based on a risk assessment, an alternate mitigation is to configure the system to deny access when revocation data is unavailable. This requirement applies to ALGs that provide user authentication intermediary services (e.g., authentication gateway or TLS gateway). This does not apply to authentication for the purpose of configuring the device itself (device management).

Check Content

1. In the Edge SWG Web UI, navigate to the Configuration tab.
2. Navigate to SSL and OCSP.

If a responder is not configured, this is a finding.

If a responder is configured, but the "Response Cache TTL" is set to "0", this is a finding.

If there are any items checked under "Ignore Settings", this is a finding.

Fix Text

1. In the Edge SWG Web UI, navigate to the Configuration tab.
2. Go to SSL and OCSP.
3. Click "Add a Responder".
4. Under URL either set it to "from certificate" if routing to the DODIN is allowed, or if it is not, click the other items and add the local site's URL.
5. Under "Issuer CCL", select the one that includes all DOD ID CAs.
6. Under the "Response Cache TTL" is set it to either "from OCSP response" or to a value of 1 or more.
7. Ensure there are no Ignore Settings checked or enabled.