STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Web Server Security Requirements Guide

V-206430

CAT II (Medium)

The web server must only accept client certificates (user and machine) issued by DOD PKI or DOD-approved PKI Certificate Authorities (CAs).

Rule ID

SV-206430r965407_rule

STIG

Web Server Security Requirements Guide

Version

V4R4

CCIs

CCI-002470

Discussion

Non-DOD approved PKIs have not been evaluated to ensure that they have security controls and identity vetting procedures in place which are sufficient for DOD systems to rely on the identity asserted in the certificate. PKIs lacking sufficient security controls and identity vetting procedures risk being compromised and issuing certificates that enable adversaries to impersonate legitimate users.

Check Content

If the web server does not provide PKI-based user authentication intermediary services, this is not applicable.

Verify the web server only allows the use of DOD PKI-established CA for verification when establishing sessions.

Verify both user and machine certificates are being validated when establishing sessions.

If the web server does not validate user and machine certificates using DOD PKI-established CAs, this is a finding.

Fix Text

Configure the web server to only allow the use of DOD PKI-established CAs for the session establishment. Configure validation for both the user and machine certificates.