SV-222572r508029_rule
V-222572
SRG-APP-000514
APSC-DV-002040
CAT II
10
Configure the application to use a FIPS-validated cryptographic module.
Interview the system administrator, review the application components, and the application requirements to determine if the application processes data requiring cryptographic protection.
Review the application documentation and interview the application administrator to identify the cryptographic modules used by the application.
Access the NIST site to determine if the cryptographic modules used by the application have been FIPS-validated.
http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm
If the application is using cryptographic modules that are not FIPS-validated to protect unclassified data, this is a finding.
V-222572
False
APSC-DV-002040
Interview the system administrator, review the application components, and the application requirements to determine if the application processes data requiring cryptographic protection.
Review the application documentation and interview the application administrator to identify the cryptographic modules used by the application.
Access the NIST site to determine if the cryptographic modules used by the application have been FIPS-validated.
http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm
If the application is using cryptographic modules that are not FIPS-validated to protect unclassified data, this is a finding.
M
4093