UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Certificate Name Filtering must be implemented with appropriate authorization and documentation.


Overview

Finding ID Version Rule ID IA Controls Severity
V-69227 ICERA030 SV-83845r1_rule Medium
Description
Certificate name filtering is a facility that allows multiple certificates to be mapped to a single ACP userid. Rather than matching a certificate stored in the ACP to determine the userid, criteria rules are used. Depending on the filter criteria, a large number of client certificates could be mapped to a single userid. Failure to properly control the use of certificate name filtering could result in the loss of individual identity and accountability.
STIG Date
z/OS ACF2 STIG 2019-03-26

Details

Check Text ( C-70017r1_chk )
If certificate name filtering is in use, collect documentation describing each active filter rule and written approval from the ISSM to use the rule.

Issue the following ACF2 commands to list the certificate name filters defined to ACF2:

SET CONTROL(GSO)
SHOW CERTMAP

If no CERTMAP FILTERING TABLES are present, there is NO FINDING.

NOTE: Certificate name filters are only valid when their Status is TRUST. Therefore, you may ignore filters with the NOTRUST status.

If CERTMAP FILTERING TABLES are present and certificate name filters have a Status of TRUST, certificate name filtering is in use.

If certificate name filtering is in use and filtering rules have been documented and approved by the ISSM, there is NO FINDING.

If certificate name filtering is in use and filtering rules have not been documented and approved by the ISSM, this is a FINDING.
Fix Text (F-75773r1_fix)
Ensure any certificate name filtering rules in use are documented and approved by the ISSM.