SV-222583r508029_rule
V-222583
SRG-APP-000224
APSC-DV-002290
CAT II
10
Configure the application to use FIPS 140-2-validated cryptographic modules when the application implements encryption, key exchange, digital signatures, random number generators, and hash functionality.
Review the application documentation and interview the application administrator.
Identify if the application implements encryption, key exchange, digital signature, or hash functionality.
Identify the cryptographic modules utilized by the application for these functions. The application may be designed to use the crypto functionality of the underlying OS or it may be a product of the application itself.
Identify the cryptographic service provider utilized by the application and reference the NIST validation website to ensure the algorithms utilized are approved.
http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm
If the application does not use FIPS 140-2-approved encryption algorithms, this is a finding.
V-222583
False
APSC-DV-002290
Review the application documentation and interview the application administrator.
Identify if the application implements encryption, key exchange, digital signature, or hash functionality.
Identify the cryptographic modules utilized by the application for these functions. The application may be designed to use the crypto functionality of the underlying OS or it may be a product of the application itself.
Identify the cryptographic service provider utilized by the application and reference the NIST validation website to ensure the algorithms utilized are approved.
http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm
If the application does not use FIPS 140-2-approved encryption algorithms, this is a finding.
M
4093