Check: APSC-DV-002040
Application Security and Development STIG:
APSC-DV-002040
(in versions v6 r2 through v4 r2)
Title
The application must utilize FIPS-validated cryptographic modules when protecting unclassified information that requires cryptographic protection. (Cat II impact)
Discussion
Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The application must implement cryptographic modules adhering to the higher standards approved by the federal government since this provides assurance they have been tested and validated.
Check Content
Interview the system administrator, review the application components, and the application requirements to determine if the application processes data requiring cryptographic protection. Review the application documentation and interview the application administrator to identify the cryptographic modules used by the application. Access the NIST site to determine if the cryptographic modules used by the application have been FIPS-validated. http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm If the application is using cryptographic modules that are not FIPS-validated to protect unclassified data, this is a finding.
Fix Text
Configure the application to use a FIPS-validated cryptographic module.
Additional Identifiers
Rule ID: SV-222572r961857_rule
Vulnerability ID: V-222572
Group Title: SRG-APP-000514
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-002450 |
Implement organization-defined types of cryptography for each specified cryptography use. |
Controls
Number | Title |
---|---|
SC-13 |
Cryptographic Protection |