SV-222555r508029_rule
V-222555
SRG-APP-000179
APSC-DV-001860
CAT II
10
Use FIPS-approved cryptographic modules.
Review the application documentation and interview the application administrator.
Identify if the application provides access to cryptographic modules and if access is required in order to manage cryptographic modules contained within the application.
If the application does not provide authenticated access to a cryptographic module, the requirement is not applicable.
Review and identify the cryptographic module. Refer to the NIST website listing all FIPS-approved cryptographic modules.
http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm
If the cryptographic module that requires authentication is not on the FIPS-approved module list, this is a finding.
V-222555
False
APSC-DV-001860
Review the application documentation and interview the application administrator.
Identify if the application provides access to cryptographic modules and if access is required in order to manage cryptographic modules contained within the application.
If the application does not provide authenticated access to a cryptographic module, the requirement is not applicable.
Review and identify the cryptographic module. Refer to the NIST website listing all FIPS-approved cryptographic modules.
http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm
If the cryptographic module that requires authentication is not on the FIPS-approved module list, this is a finding.
M
4093