Check: SRG-NET-000063-VPN-000220
Virtual Private Network (VPN) SRG:
SRG-NET-000063-VPN-000220
(in versions v3 r3 through v2 r5)
Title
The VPN Gateway must be configured to use IPsec with SHA-2 at 384 bits or greater for hashing to protect the integrity of remote access sessions. (Cat II impact)
Discussion
Without strong cryptographic integrity protections, information can be altered by unauthorized users without detection. SHA-1 is considered a compromised hashing standard and is being phased out of use by industry and government standards. DOD systems must not be configured to use SHA-1 for integrity of remote access sessions. The remote access VPN provides access to DOD nonpublic information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network.
Check Content
Verify the VPN Gateway uses IPsec with SHA-2 at 384 bits or greater for hashing to protect the integrity of remote access sessions. If the VPN Gateway does not use IPsec with SHA-2 at 384 bits or greater for hashing to protect the integrity of remote access sessions, this is a finding.
Fix Text
Configure the VPN Gateway to use IPsec with SHA-2 at 384 bits or greater for hashing to protect the integrity of remote access sessions.
Additional Identifiers
Rule ID: SV-207192r916146_rule
Vulnerability ID: V-207192
Group Title: SRG-NET-000063
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001453 |
Implement cryptographic mechanisms to protect the integrity of remote access sessions. |
Controls
Number | Title |
---|---|
AC-17(2) |
Protection of Confidentiality / Integrity Using Encryption |