Check: 3.077
Win2k8 R2 Audit:
3.077
(in version v1 r8)
Title
The system will be configured to use FIPS-compliant algorithms for encryption, hashing, and signing. (Cat II impact)
Discussion
This setting ensures that the system uses algorithms that are FIPS-compliant for encryption, hashing, and signing. FIPS-compliant algorithms meet specific standards established by the U.S. Government and should be the algorithms used for all OS encryption functions.
Check Content
Fix Text
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing” to “Enabled”.
Additional Identifiers
Rule ID: SV-32342r1_rule
Vulnerability ID: V-3383
Group Title: FIPS Compliant Algorithms
Expert Comments
Expert comments are only available to logged-in users.
CCIs
CCIs tied to check.
Number | Definition |
---|---|
No CCIs are assigned to this check |
Controls
Controls tied to check. These are derived from the CCIs shown above.
Number | Title |
---|---|
No controls are assigned to this check |