Allow Only SSH Protocol 2
The A10 Networks ADC must prohibit the use of unencrypted protocols for network access to privileged accounts.
AAA Services must be configured to encrypt transmitted credentials using a FIPS-validated cryptographic module.
The Apache web server must encrypt passwords during transmission.
An Apache web server must maintain the confidentiality of controlled information during transmission through the use of an approved TLS version.
The ALG providing user authentication intermediary services must transmit only encrypted representations of passwords.
The application server must transmit only encrypted representations of passwords.
The application server must utilize encryption when using LDAP for authentication.
The application must transmit only cryptographically-protected passwords.
The CA API Gateway providing user authentication intermediary services must transmit only encrypted representations of passwords.
Passwords sent through ODBC/JDBC must be encrypted.
For accounts using password authentication, the Central Log Server must use FIPS-validated SHA-1 or later protocol to protect the integrity of the password authentication process.
FIPS mode must be enabled on all Docker Engine - Enterprise nodes.
The FortiGate device must use LDAPS for the LDAP connection.
If passwords are used for authentication, DB2 must transmit only encrypted representations of passwords.
The IBM Aspera Console feature must be configured to use encryption services that implement NIST FIPS-validated cryptography to protect the confidentiality of remote access sessions.
The IBM Aspera Faspex feature must be configured to use encryption services that implement NIST FIPS-validated cryptography to protect the confidentiality of remote access sessions.
The IBM Aspera Shares feature must be configured to use encryption services that implement NIST FIPS-validated cryptography to protect the confidentiality of remote access sessions.
The IBM Aspera High-Speed Transfer Server must enable the use of dynamic token encryption keys.
Access to the MQ Appliance messaging server must utilize encryption when using LDAP for authentication.
The WebSphere Liberty Server must use TLS-enabled LDAP.
The WebSphere Application Server global application security must be enabled.
The WebSphere Application Server Single Sign On (SSO) must have SSL enabled for Web and SIP Security.
The WebSphere Application Server application security must be enabled for each security domain except for publicly available applications specified in the System Security Plan.
The WebSphere Application Server secure LDAP (LDAPS) must be used for authentication.
CA VM:Secure product Password Encryption (PEF) option must be properly configured to store and transmit cryptographically-protected passwords.
LDAP enabled security realm value allow-empty-passwords must be set to false.
JBoss must utilize encryption when using LDAP for authentication.
For local accounts using password authentication (i.e., the root account and the account of last resort) the Juniper SRX Services Gateway must use the SHA1 or later protocol for password authentication.
The Mainframe Product must transmit only cryptographically protected passwords.
The network device must transmit only encrypted representations of passwords.
Nutanix AOS must utilize encryption when using LDAP for authentication.
Nutanix AOS must not have the rsh-server package installed.
OHS must have the LoadModule ossl_module directive enabled to encrypt passwords during transmission.
OHS must use FIPS modules to encrypt passwords during transmission.
OHS must have the SSLEngine, SSLProtocol, and SSLWallet directives enabled and configured to encrypt passwords during transmission.
OHS must have the SSLCipherSuite directive enabled to encrypt passwords during transmission.
Oracle WebLogic must encrypt passwords during transmission.
Oracle WebLogic must utilize encryption when using LDAP for authentication.
The Riverbed NetProfiler must be configured to implement cryptographic mechanisms using a FIPS 140-2/140-3 validated algorithm to protect the confidentiality and integrity of all cryptographic functions.
Splunk Enterprise must use LDAPS for the LDAP connection.
Symantec ProxySG must transmit only encrypted representations of passwords.
For UEM server using password authentication, the network element must use FIPS-validated SHA-2 or later protocol to protect the integrity of the password authentication process.
For accounts using password authentication, the site-to-site VPN Gateway must use SHA-2 or later protocol to protect the integrity of the password authentication process.
The Apache web server must use cryptography to protect the integrity of remote sessions.
The Apache web server must use encryption strength in accordance with the categorization of data hosted by the Apache web server when remote connections are provided.
TLS 1.2 must be used on secured HTTP connectors.
LDAP authentication must be secured.
The macOS system must be configured to disable the tftp service.
The macOS system must be configured to disable the "tftp" service.
The macOS system must disable Trivial File Transfer Protocol service.
The Ubuntu operating system must not have the telnet package installed.
If passwords are used for authentication, PostgreSQL must transmit only encrypted representations of passwords.
For accounts using password authentication, the Cisco ISE must use FIPS-validated SHA-2 or later protocol to protect the integrity of the password authentication process.
For accounts using password authentication, the container platform must use FIPS-validated SHA-2 or later protocol to protect the integrity of the password authentication process.
If passwords are used for authentication, the EDB Postgres Advanced Server must transmit only encrypted representations of passwords.
If passwords are used for authentication, the DBMS must transmit only encrypted representations of passwords.
The operating system must transmit only encrypted representations of passwords.
SSMC web server must use encryption strength in accordance with the categorization of data hosted by the web server when remote connections are provided.
The HPE 3PAR OS must be configured to restrict the encryption algorithms and protocols to comply with DOD-approved encryption to protect the confidentiality and integrity of remote access sessions.
The HPE 3PAR OS CIMserver process must be configured to use approved encryption and communications protocols to protect the confidentiality of remote access sessions.
The HPE 3PAR OS WSAPI process must be configured to use approved encryption and communications protocols to protect the confidentiality of remote access sessions.
IF LDAP is used, AIX LDAP client must use SSL to authenticate with LDAP server.
AIX root passwords must never be passed over a network in clear text form.
The AIX rexec daemon must not be running.
AIX telnet daemon must not be running.
AIX ftpd daemon must not be running.
AIX must disable /usr/bin/rcp,
/usr/bin/rlogin,
/usr/bin/rsh, /usr/bin/rexec and /usr/bin/telnet commands.
The AIX rsh daemon must be disabled.
The AIX rlogind service must be disabled.
IBM z/OS must use NIST FIPS-validated cryptography to protect passwords in the security database.
ACF2 must use NIST FIPS-validated cryptography to protect passwords in the security database.
NIST FIPS-validated cryptography must be used to protect passwords in the security database.
The ICS must be configured to transmit only encrypted representations of passwords.
If passwords are used for authentication, the MarkLogic Server must transmit only encrypted representations of passwords.
If passwords are used for authentication, MariaDB must transmit only encrypted representations of passwords.
If passwords are used for authentication, MongoDB must transmit only encrypted representations of passwords.
A private IIS 10.0 website authentication mechanism must use client certificates to transmit session identifier to assure integrity.
If passwords are used for authentication, SQL Server must transmit only encrypted representations of passwords.
Confidentiality of information during transmission is controlled through the use of an approved TLS version.
Unencrypted passwords must not be sent to third-party SMB Servers.
Unencrypted passwords must not be sent to third-party Server Message Block (SMB) servers.
Windows Server 2019 unencrypted passwords must not be sent to third-party Server Message Block (SMB) servers.
Windows Server 2022 unencrypted passwords must not be sent to third-party Server Message Block (SMB) servers.
The Oracle Linux operating system must be configured so that the SSH daemon is configured to only use the SSHv2 protocol.
If passwords are used for authentication, the MySQL Database Server 8.0 must transmit only encrypted representations of passwords.
The Palo Alto Networks security platform must prohibit the use of unencrypted protocols for network access to privileged accounts.
Automation Controller must use encryption strength in accordance with the categorization of the management data during remote access management sessions.
Automation Controller must utilize encryption when using LDAP for authentication.
OpenShift must use FIPS validated LDAP or OpenIDConnect.
The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon is configured to only use the SSHv2 protocol.
RHEL 9 must not have a File Transfer Protocol (FTP) server package installed.
The SUSE operating system must not have the telnet-server package installed.
The SUSE operating system must not have the vsftpd package installed if not required for operational support.
The SUSE operating system must not have the vsftpd package installed if not required for operational support.
The SUSE operating system must not have the telnet-server package installed.
The boundary protection system (firewall) must be configured to deny network traffic by default and must allow network traffic by exception (i.e., deny all, permit by exception).
Splunk Enterprise must be installed in FIPS mode to implement NIST FIPS-approved cryptography for all cryptographic functions.
The VMM must transmit only encrypted representations of passwords.
The Solidcore client Command Line Interface (CLI) Access Password protection process must be documented in the organizations written policy.
VAMI must use cryptography to protect the integrity of remote sessions.
The vCenter Server must enable FIPS-validated cryptography.
The Photon operating system must use an OpenSSH server version that does not support protocol 1.
VMware Postgres must be configured to use Transport Layer Security (TLS).
Envoy must use only Transport Layer Security (TLS) 1.2 for the protection of client connections.
The Photon operating system must not have the telnet package installed.
The vCenter PostgreSQL service must require authentication on all connections.
The vCenter STS service must be configured to use strong encryption ciphers.
The web server must encrypt passwords during transmission.
The BIG-IP appliance must only transmit encrypted representations of passwords.
The macOS system must disable Trivial File Transfer Protocol (TFTP) service.
Ubuntu 22.04 LTS must not have the "telnet" package installed.
The Enterprise Voice, Video, and Messaging Endpoint, when using passwords or PINs for authentication or authorization, must be configured to cryptographically protect the PIN or password.
For accounts using password authentication, the Enterprise Voice, Video, and Messaging Session Manager must be configured to use FIPS-validated SHA-2 or later protocol to protect the integrity of the password authentication process.
For accounts using password authentication, the F5 BIG-IP appliance site-to-site IPsec VPN Gateway must use SHA-2 or later protocol to protect the integrity of the password authentication process.
FIPS mode must be enabled.
SLEM 5 must not have the telnet-server package installed.
TOSS must not have the rsh-server package installed.
The NSX Manager must only enable TLS 1.2 or greater.
For accounts using password authentication, the site-to-site VPN Gateway must use SHA-2 or later protocol to protect the integrity of the password authentication process.