Details
A certificate revocation list is a directory which contains a list of certificates that have been revoked for various reasons. Certificates may be revoked due to improper issuance, compromise of the certificate, and failure to adhere to policy. Therefore, any certificate found on a CRL should not be trusted. Permitting execution of an applet published with a revoked certificate may result in spoofing, malware, system modification, invasion of privacy, and denial of service.
Solution
If the system is on the SIPRNet, this requirement is NA.
Enable the ‘Check certificates for revocation using Certificate Revocation Lists (CRL)’ option.
Navigate to the system-level ‘deployment.properties’ file for JRE.
/etc/.java/deployment/deployment.properties
Add the key ‘deployment.security.validation.crl=true’ to the deployment.properties file.
Add the key ‘deployment.security.validation.crl.locked’ to the deployment.properties file.
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Identification and Authentication.This control applies to the following type of system Unix.
References
- 800-53|IA-5(2)(d)
- CAT|II
- CCI|CCI-001991
- Rule-ID|SV-81419r1_rule
- STIG-ID|JRE8-UX-000150
- Vuln-ID|V-66929