Configure Smart Card Certificate Status Checking
An XCCDF Rule
Description
Configure the operating system to do certificate status checking for PKI
authentication. Modify all of the cert_policy
lines in
/etc/pam_pkcs11/pam_pkcs11.conf
to include ocsp_on
like so:
cert_policy = ca, ocsp_on, signature;
Rationale
Using an authentication device, such as a CAC or token that is separate from
the information system, ensures that even if the information system is
compromised, that compromise will not affect credentials stored on the
authentication device.
Multifactor solutions that require devices separate from
information systems gaining access include, for example, hardware tokens
providing time-based or challenge-response authenticators and smart cards such
as the U.S. Government Personal Identity Verification card and the DoD Common
Access Card.
- ID
- xccdf_org.ssgproject.content_rule_smartcard_configure_cert_checking
- Severity
- Medium
- References
- Updated
Remediation - Ansible
- name: Package facts
package_facts: null
when:
- ansible_virtualization_type not in ["docker", "lxc", "openvz", "podman", "container"]
- ansible_architecture != "s390x"
tags:
Remediation - Shell Script
# Remediation is applicable only in certain platforms
if [ ! -f /.dockerenv ] && [ ! -f /run/.containerenv ] && { ! grep -q s390x /proc/sys/kernel/osrelease; }; then
zypper install -y "pam_pkcs11"
if grep "^\s*cert_policy" /etc/pam_pkcs11/pam_pkcs11.conf | grep -qv "ocsp_on"; then