SV-222571r508029_rule
V-222571
SRG-APP-000514
APSC-DV-002030
CAT II
10
Configure the application to use a FIPS-validated hashing algorithm when creating a cryptographic hash.
Review the application components and the application requirements to determine if the application is capable of generating cryptographic hashes.
Review the application documentation and interview the application developer or administrator to identify the cryptographic modules used by the application.
If hashing of application components has been identified in the application security plan as not being required and if a documented acceptance of risk is provided, this is not a finding.
Have the application admin or the developer demonstrate how the application generates hashes and what hashing algorithms are used when generating a hash value.
While SHA1 is currently FIPS-140-2 approved, due to known vulnerabilities with this algorithm, DoD PKI policy prohibits the use of SHA1 as of December 2016. See DoD CIO Memo Subject: Revised Schedule to Update DoD Public Key Infrastructure Certificates to Secure Hash Algorithm-256.
If the application resides on a National Security System (NSS) and uses an algorithm weaker than SHA-384, this is a finding.
If FIPS-validated cryptographic modules are not used when generating hashes or if the application is configured to use the MD5 or SHA1 hashing algorithm, this is a finding.
V-222571
False
APSC-DV-002030
Review the application components and the application requirements to determine if the application is capable of generating cryptographic hashes.
Review the application documentation and interview the application developer or administrator to identify the cryptographic modules used by the application.
If hashing of application components has been identified in the application security plan as not being required and if a documented acceptance of risk is provided, this is not a finding.
Have the application admin or the developer demonstrate how the application generates hashes and what hashing algorithms are used when generating a hash value.
While SHA1 is currently FIPS-140-2 approved, due to known vulnerabilities with this algorithm, DoD PKI policy prohibits the use of SHA1 as of December 2016. See DoD CIO Memo Subject: Revised Schedule to Update DoD Public Key Infrastructure Certificates to Secure Hash Algorithm-256.
If the application resides on a National Security System (NSS) and uses an algorithm weaker than SHA-384, this is a finding.
If FIPS-validated cryptographic modules are not used when generating hashes or if the application is configured to use the MD5 or SHA1 hashing algorithm, this is a finding.
M
4093