CCI|CCI-002421

Title

The information system implements cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission unless otherwise protected by organization-defined alternative physical safeguards.

Reference Item Details

Category: 2013

Audit Items

View all Reference Audit Items

NamePluginAudit Name
3.042 - Outgoing secure channel traffic is not signed when possible.WindowsDISA Windows Vista STIG v6r41
3.043 - Outgoing secure channel traffic is not encrypted when possible.WindowsDISA Windows Vista STIG v6r41
3.045 - The Windows SMB client is not enabled to perform SMB packet signing when possible.WindowsDISA Windows Vista STIG v6r41
3.046 - The Windows SMB server is not enabled to perform SMB packet signing when possible.WindowsDISA Windows Vista STIG v6r41
3.113 - Outgoing secure channel traffic is not encrypted or signed.WindowsDISA Windows Vista STIG v6r41
3.114 - The Windows Server SMB client is not enabled to always perform SMB packet signing.WindowsDISA Windows Vista STIG v6r41
3.115 - The Windows Server SMB server is not enabled to always perform SMB packet signing.WindowsDISA Windows Vista STIG v6r41
4.044 - The system is not configured to require a strong session key.WindowsDISA Windows Vista STIG v6r41
5.3.1 Ensure SSH is installedUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
5.3.2 Ensure SSH is runningUnixCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
AOSX-13-000035 - The macOS system must implement DoD-approved encryption to protect the confidentiality and integrity of remote access sessions including transmitted data and data during preparation for transmission.UnixDISA STIG Apple Mac OSX 10.13 v2r5
AOSX-14-000011 - The macOS system must implement DoD-approved encryption to protect the confidentiality and integrity of remote access sessions including transmitted data and data during preparation for transmission - OpenSSH versionUnixDISA STIG Apple Mac OSX 10.14 v2r6
AOSX-14-000011 - The macOS system must implement DoD-approved encryption to protect the confidentiality and integrity of remote access sessions including transmitted data and data during preparation for transmission - SSHD currently runningUnixDISA STIG Apple Mac OSX 10.14 v2r6
AOSX-14-000011 - The macOS system must implement DoD-approved encryption to protect the confidentiality and integrity of remote access sessions including transmitted data and data during preparation for transmission - SSHD service disabledUnixDISA STIG Apple Mac OSX 10.14 v2r6
APPL-11-000011 - The macOS system must disable the SSHD service.UnixDISA STIG Apple macOS 11 v1r5
APPL-11-000011 - The macOS system must disable the SSHD service.UnixDISA STIG Apple macOS 11 v1r6
APPL-12-000011 - The macOS system must disable the SSHD service.UnixDISA STIG Apple macOS 12 v1r4
Catalina - Enable SSH for Remote Access SessionsUnixNIST macOS Catalina v1.5.0 - All Profiles
DKER-EE-001050 - TCP socket binding for all Docker Engine - Enterprise nodes in a Universal Control Plane (UCP) cluster must be disabled.UnixDISA STIG Docker Enterprise 2.x Linux/Unix v2r1
EX13-CA-000155 - Exchange OWA must have S/MIME Certificates enabled.WindowsDISA Microsoft Exchange 2013 Client Access Server STIG v2r1
JBOS-AS-000655 - JBoss must be configured to use an approved cryptographic algorithm in conjunction with TLS.UnixDISA RedHat JBoss EAP 6.3 STIG v2r3
O121-C1-019700 - The DBMS must employ cryptographic mechanisms preventing the unauthorized disclosure of information during transmission unless the transmitted data is otherwise protected by alternative physical measures - CLIENTWindowsDISA STIG Oracle 12c v2r4 Windows
O121-C1-019700 - The DBMS must employ cryptographic mechanisms preventing the unauthorized disclosure of information during transmission unless the transmitted data is otherwise protected by alternative physical measures - CLIENTUnixDISA STIG Oracle 12c v2r4 Linux
O121-C1-019700 - The DBMS must employ cryptographic mechanisms preventing the unauthorized disclosure of information during transmission unless the transmitted data is otherwise protected by alternative physical measures - SERVERUnixDISA STIG Oracle 12c v2r4 Linux
O121-C1-019700 - The DBMS must employ cryptographic mechanisms preventing the unauthorized disclosure of information during transmission unless the transmitted data is otherwise protected by alternative physical measures - SERVERWindowsDISA STIG Oracle 12c v2r4 Windows
OL6-00-000293 - Wireless network adapters must be disabled.UnixDISA STIG Oracle Linux 6 v2r6
OL07-00-041010 - The Oracle Linux operating system must be configured so that all wireless network adapters are disabled.UnixDISA Oracle Linux 7 STIG v2r9
OL08-00-040159 - All OL 8 networked systems must have SSH installed.UnixDISA Oracle Linux 8 STIG v1r2
OL08-00-040160 - All OL 8 networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.UnixDISA Oracle Linux 8 STIG v1r2
PHTN-67-000067 - The Photon operating system must configure sshd to use FIPS 140-2 ciphers.UnixDISA STIG VMware vSphere 6.7 Photon OS v1r3
RHEL-07-040300 - The Red Hat Enterprise Linux operating system must be configured so that all networked systems have SSH installed.UnixDISA Red Hat Enterprise Linux 7 STIG v3r9
RHEL-07-040310 - The Red Hat Enterprise Linux operating system must be configured so that all networked systems use SSH for confidentiality and integrity of transmitted and received information as well as information during preparation for transmission.UnixDISA Red Hat Enterprise Linux 7 STIG v3r9
SHPT-00-000805 - The organization must employ cryptographic mechanisms to prevent unauthorized disclosure of information during transmission unless otherwise protected by alternative physical measures.WindowsDISA STIG SharePoint 2010 v1r9
SLES-12-030100 - All networked SUSE operating systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission - activeUnixDISA SLES 12 STIG v2r7
SLES-12-030100 - All networked SUSE operating systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.UnixDISA SLES 12 STIG v2r7
SLES-15-010530 - All networked SUSE operating systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission - activeUnixDISA SLES 15 STIG v1r6
SLES-15-010530 - All networked SUSE operating systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.UnixDISA SLES 15 STIG v1r6
SOL-11.1-060080 - The operating system must employ cryptographic mechanisms to recognize changes to information during transmission unless otherwise protected by alternative physical measures.UnixDISA STIG Solaris 11 X86 v2r6
SOL-11.1-060080 - The operating system must employ cryptographic mechanisms to recognize changes to information during transmission unless otherwise protected by alternative physical measures.UnixDISA STIG Solaris 11 SPARC v2r6
SOL-11.1-060110 - The operating system must employ cryptographic mechanisms to prevent unauthorized disclosure of information during transmission unless otherwise protected by alternative physical measures.UnixDISA STIG Solaris 11 SPARC v2r6
SOL-11.1-060110 - The operating system must employ cryptographic mechanisms to prevent unauthorized disclosure of information during transmission unless otherwise protected by alternative physical measures.UnixDISA STIG Solaris 11 X86 v2r6
SP13-00-000135 - SharePoint must employ cryptographic mechanisms preventing the unauthorized disclosure of information during transmission, unless the transmitted data is otherwise protected by alternative physical measures.WindowsDISA STIG SharePoint 2013 v2r3
TCAT-AS-000750 - Tomcat must use FIPS-validated ciphers on secured connectors.UnixDISA STIG Apache Tomcat Application Server 9 v2r4 Middleware
TCAT-AS-000750 - Tomcat must use FIPS-validated ciphers on secured connectors.UnixDISA STIG Apache Tomcat Application Server 9 v2r4
UBTU-16-030420 - All networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission - installedUnixDISA STIG Ubuntu 16.04 LTS v2r3
UBTU-16-030420 - All networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission - runningUnixDISA STIG Ubuntu 16.04 LTS v2r3
UBTU-20-010044 - The Ubuntu operating system must configure the SSH daemon to use FIPS 140-2 approved ciphers to prevent the unauthorized disclosure of information and/or detect changes to information during transmission.UnixDISA STIG Ubuntu 20.04 LTS v1r5
WBLC-06-000190 - Oracle WebLogic must employ cryptographic encryption to protect the integrity and confidentiality of nonlocal maintenance and diagnostic communications - Listen PortUnixOracle WebLogic Server 12c Linux v2r1 Middleware
WBLC-06-000190 - Oracle WebLogic must employ cryptographic encryption to protect the integrity and confidentiality of nonlocal maintenance and diagnostic communications - Listen PortUnixOracle WebLogic Server 12c Linux v2r1
WBLC-06-000190 - Oracle WebLogic must employ cryptographic encryption to protect the integrity and confidentiality of nonlocal maintenance and diagnostic communications - Listen PortWindowsOracle WebLogic Server 12c Windows v2r1