ASVS icon indicating copy to clipboard operation
ASVS copied to clipboard

Missing requirement trusted certificates V9.1

Open roelstorms opened this issue 3 years ago • 6 comments

9.2.1 states the following

Verify that connections to and from the server use trusted TLS certificates. Where internally generated or self-signed certificates are used, the server must be configured to only trust specific internal CAs and specific self-signed certificates. All others should be rejected.

For 9.1 there is no requirement that requires to use trusted certificates. Propose to add 9.1.5: Verify that connections to and from the server use trusted TLS certificates. Where internally generated or self-signed certificates are used, the client must be configured to only trust specific internal CAs and specific self-signed certificates. All others should be rejected.

This section in bold implies you have control over the client and would typically apply for applications used by your employees only. In such a case you would have an SSL certificate which is signed by your companies internal PKI.

roelstorms avatar Mar 25 '21 14:03 roelstorms

Astute observation, I like it @roelstorms

jmanico avatar Mar 25 '21 14:03 jmanico

Can we extend the verification to Certificate Authorities similar to the process undertaken by https://www.dta.gov.au/our-projects/digital-identity/gatekeeper-public-key-infrastructure-framework and https://github.com/ssllabs/research/wiki/SSL-and-TLS-Deployment-Best-Practices#14-obtain-certificates-from-a-reliable-ca too?

cmlh avatar May 01 '21 01:05 cmlh

@roelstorms do you think the changes in #1221 make this clearer and cover what you were trying to achieve?

tghosth avatar Feb 10 '22 14:02 tghosth

@roelstorms any further feedback? I will probably close during mid-May if there is no further feedback.

tghosth avatar Apr 18 '22 17:04 tghosth

No further remarks. Looks good.

roelstorms avatar Apr 18 '22 19:04 roelstorms

@tghosth - is it actually done and can be closed?

elarlang avatar Oct 03 '22 06:10 elarlang

@roelstorms said it did what he wanted so I am going to close, thanks

tghosth avatar Oct 21 '22 10:10 tghosth