MSR's self-signed certificates must be replaced with DOD trusted, signed certificates.
An XCCDF Rule
Description
<VulnDiscussion>Self-signed certificates pose security risks, as they are not issued by a trusted third party. DOD trusted, signed certificates have undergone a validation process by a trusted CA, reducing the risk of man-in-the-middle attacks and unauthorized access. Using these certificates enhances the trust and authenticity of the communication between clients and the MSR server.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>
- ID
- SV-260916r966105_rule
- Severity
- Medium
- References
- Updated
Remediation - Manual Procedure
If MSR is not being utilized, this is Not Applicable.
Ensure the certificates are from a trusted DOD CA.
1. Add the secret to the cluster by executing the following: