Capacity
CCI-004909
Include only approved trust anchors in trust stores or certificate stores managed by the organization.
Choose one
1
Rule
Severity: Medium
AAA Services must be configured to include only approved trust anchors in trust stores or certificate stores managed by the organization.
1
Rule
Severity: Medium
DOD root CA certificates must be installed in Tomcat trust store.
1
Rule
Severity: Medium
The macOS system must issue or obtain public key certificates from an approved service provider.
1
Rule
Severity: Medium
The ALG must include only approved trust anchors in trust stores or certificate stores managed by the organization.
1
Rule
Severity: Medium
The application server must include only approved trust anchors in trust stores or certificate stores managed by the organization.
1
Rule
Severity: Medium
Ubuntu 22.04 LTS, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.
1
Rule
Severity: Medium
The Central Log Server must include only approved trust anchors in trust stores or certificate stores managed by the organization.
2
Rule
Severity: Medium
The Cisco router must be configured to obtain its public key certificates from an appropriate certificate policy through an approved service provider.
1
Rule
Severity: Medium
The Cisco ASA must be configured to obtain its public key certificates from an appropriate certificate policy through an approved service provider.
3
Rule
Severity: Medium
The Cisco switch must be configured to obtain its public key certificates from an appropriate certificate policy through an approved service provider.
1
Rule
Severity: Medium
The container platform must include only approved trust anchors in trust stores or certificate stores managed by the organization.
1
Rule
Severity: Medium
The DBMS must include only approved trust anchors in trust stores or certificate stores managed by the organization.
1
Rule
Severity: Medium
The DNS server implementation must include only approved trust anchors in trust stores or certificate stores managed by the organization.
1
Rule
Severity: Medium
The operating system must include only approved trust anchors in trust stores or certificate stores managed by the organization.
1
Rule
Severity: Medium
All IBM z/OS digital certificates in use must have a valid path to a trusted Certification authority.
1
Rule
Severity: Medium
All digital certificates in use must have a valid path to a trusted certification authority (CA).
1
Rule
Severity: Medium
The Juniper router must be configured to obtain its public key certificates from an appropriate certificate policy through an approved service provider.
1
Rule
Severity: Medium
The Mainframe Product must include only approved trust anchors in trust stores or certificate stores managed by the organization.
1
Rule
Severity: Medium
The network device must be configured to include only approved trust anchors in trust stores or certificate stores managed by the organization.
2
Rule
Severity: Medium
Splunk Enterprise must only allow the use of DOD-approved certificate authorities for cryptographic functions.
1
Rule
Severity: Medium
The VMM must include only approved trust anchors in trust stores or certificate stores managed by the organization.
1
Rule
Severity: Medium
The web server must include only approved trust anchors in trust stores or certificate stores managed by the organization.
Patternfly
PatternFly elements
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.
Modules
66%