STIGQter STIGQter: STIG Summary: SEL-2740S NDM Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 02 May 2019:

The SEL-2740S must be adopted by OTSDN Controller(s) and obtain its public key certificates from an appropriate certificate policy through an approved service provider.

DISA Rule

SV-102395r1_rule

Vulnerability Number

V-92307

Group Title

SRG-APP-000516-NDM-000344

Rule Version

SELS-ND-001410

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Import a PEM or PFX X.509 Certificate from an approved service provider into the flow controller as the Root CA certificate so the flow controller can use it to generate and commission the SEL-2740S with an accepted chain of trust. To do this log into the flow controller with security administrator privileges and navigate to the Administration page and then to the X.509 page. Select Import and use the certificate type CA Cert.

Check Contents

Ensure the SEL-2740S X.509 certificate is properly configured on the SEL-2740S by checking the "Certificates" page on the OTSDN Controller.

If the SEL-2740S public keys were not provided by an approved certificate policy or authority, this is a finding.

Vulnerability Number

V-92307

Documentable

False

Rule Version

SELS-ND-001410

Severity Override Guidance

Ensure the SEL-2740S X.509 certificate is properly configured on the SEL-2740S by checking the "Certificates" page on the OTSDN Controller.

If the SEL-2740S public keys were not provided by an approved certificate policy or authority, this is a finding.

Check Content Reference

M

Target Key

3383

Comments