GEN006575 - The file integrity tool must use FIPS 140-2 approved cryptographic hashes for validating file contents - config

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

File integrity tools often use cryptographic hashes for verifying that file contents have not been altered. These hashes must be FIPS 140-2 approved.

Solution

If using AIDE, edit the configuration and add the sha256 or sha512 option for all monitored files and directories.

If using a different file integrity tool, configure FIPS 140-2 approved cryptographic hashes per the tool's documentation.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_10_x86_V2R2_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SC-13, 800-53|SI-7(1), CAT|III, CCI|CCI-001496, Rule-ID|SV-227955r603266_rule, STIG-ID|GEN006575, STIG-Legacy|SV-26861, STIG-Legacy|V-22509, Vuln-ID|V-227955

Plugin: Unix

Control ID: 8838deffd5d58676bd8e05d232d90352a95683725d90e48d307493ad6a4ae315