Check: APAS-CF-000885
Adobe ColdFusion STIG:
APAS-CF-000885
(in version v1 r1)
Title
JVM arguments must be configured to use approved cryptographic mechanisms to protect data in transit. (Cat I impact)
Discussion
ColdFusion uses the underlying JVM to handle transmission and receiving data, but ColdFusion does offer the programmer an encrypt API call to protect the data. This call can use multiple crypto methods but using FIPS 140-2/140-3 or higher is superior to those non-FIPS crypto methods to protect and detect changes to the data. Through JVM arguments set within ColdFusion, the programmer can be forced to use only FIPS crypto methods.
Check Content
Verify JVM Arguments for Crypto. 1. From the Admin Console Landing Screen, navigate to Server Settings >> Java and JVM. If the JVM argument contains "-Dcoldfusion.enablefipscrypto=false" or "-Dcoldfusion.enablefipscrypto" is missing, this is a finding. 2. Observe the ColdFusion edition at the top of the Administrator Console. If the edition is "Standard", this is a finding.
Fix Text
Configure JVM Arguments for Crypto. 1. From the Admin Console Landing Screen, navigate to Server Settings >> Java and JVM. 2. Amend JVM arguments with "-Dcoldfusion.enablefipscrypto=true". 3. Click "Submit Changes". 4. If not using Enterprise Edition or cryptographic mechanisms are not available, reinstall with Enterprise Edition.
Additional Identifiers
Rule ID: SV-279095r1171617_rule
Vulnerability ID: V-279095
Group Title: SRG-APP-000440-AS-000167
Expert Comments
CCIs
| Number | Definition |
|---|---|
| CCI-002421 |
Implement cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission. |
Controls
| Number | Title |
|---|---|
| SC-8(1) |
Cryptographic Protection |