Skip to main content
CUI

STIG Rule - V-278192

V-278192

SV-278192r1182309_rule

CAT II

Windows Server 2025 must have the DOD Root Certificate Authority (CA) certificates installed in the Trusted Root Store.

From: Microsoft Windows Server 2025 Security Technical Implementation Guide (V1R1)

Description

<VulnDiscussion>To ensure secure DOD websites and DOD-signed code are properly validated, the system must trust the DOD Root CAs. The DOD root certificates will ensure that the trust chain is established for server certificates issued from the DOD CAs. Satisfies: SRG-OS-000066-GPOS-00034, SRG-OS-000403-GPOS-00182, SRG-OS-000775-GPOS-00230</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>

Check Procedure

The certificates and thumbprints referenced below apply to unclassified systems. Refer to the PKE documentation for other networks. Open PowerShell as an administrator. Execute the following command: Get-ChildItem -Path Cert:Localmachine\root | Where Subject -Like "*DOD*" | FL Subject, Thumbprint, NotAfter If the following certificate "Subject" and "Thumbprint" information is not displayed, this is a finding: Subject: CN=DOD Root CA 2, OU=PKI, OU=DOD, O=U.S. Government, C=US Thumbprint: 8C941B34EA1EA6ED9AE2BC54CF687252B4C9B561 NotAfter: 12/5/2029 Subject: CN=DOD Root CA 3, OU=PKI, OU=DOD, O=U.S. Government, C=US Thumbprint: D73CA91102A2204A36459ED32213B467D7CE97FB NotAfter: 12/30/2029 Subject: CN=DOD Root CA 4, OU=PKI, OU=DOD, O=U.S. Government, C=US Thumbprint: B8269F25DBD937ECAFD4C35A9838571723F2D026 NotAfter: 7/25/2032 Subject: CN=DOD Root CA 5, OU=PKI, OU=DOD, O=U.S. Government, C=US Thumbprint: 4ECB5CC3095670454DA1CBD410FC921F46B8564B NotAfter: 6/14/2041 Alternately, use the Certificates MMC snap-in: Run "MMC". Select "File", "Add/Remove Snap-in". Select "Certificates" and click "Add". Select "Computer account" and click "Next". Select "Local computer: (the computer this console is running on)" and click "Finish". Click "OK". Expand "Certificates" and navigate to "Trusted Root Certification Authorities >> Certificates". For each of the DOD Root CA certificates noted below: Right-click the certificate and select "Open". Select the "Details" tab. Scroll to the bottom and select "Thumbprint". If the DOD Root CA certificates below are not listed or the value for the "Thumbprint" field is not as noted, this is a finding: DOD Root CA 3 Thumbprint: D73CA91102A2204A36459ED32213B467D7CE97FB Valid to: Sunday, December 30, 2029 DOD Root CA 4 Thumbprint: B8269F25DBD937ECAFD4C35A9838571723F2D026 Valid to: Sunday, July 25, 2032 DOD Root CA 5 Thumbprint: 4ECB5CC3095670454DA1CBD410FC921F46B8564B Valid to: Friday, June 14, 2041

Fix Text

Install the DOD Root CA certificates: DOD Root CA 3 DOD Root CA 4 DOD Root CA 5 The InstallRoot tool is available on Cyber Exchange at https://cyber.mil/pki-pke/tools-configuration-files.

CCI Reference

CCI-000185,CCI-002470,CCI-004909
Created
2026-04-07 20:08:26
Last Updated
2026-04-07 20:08:26
CUI