The Installed Operating System Is FIPS 140-2 Certified
Install the dracut-fips-aesni Package
Install the dracut-fips Package
Ensure '/etc/system-fips' exists
Enable FIPS Mode in GRUB2
Set PAM''s Password Hashing Algorithm
Uninstall krb5-workstation Package
Set PAM''s Password Hashing Algorithm - password-auth
Remove the Kerberos Server Package
Disable Kerberos by removing host keytab
Use Only FIPS 140-2 Validated Ciphers
Use Only FIPS 140-2 Validated MACs
Enable Dracut FIPS Module
Set kernel parameter 'crypto.fips_enabled' to 1
Set Password Hashing Rounds in /etc/login.defs
Verify All Account Password Hashes are Shadowed with SHA512
Set PAM's Common Authentication Hashing Algorithm
The Apache web server must use encryption strength in accordance with the categorization of data hosted by the Apache web server when remote connections are provided.
An Apache web server must maintain the confidentiality of controlled information during transmission through the use of an approved TLS version.
The Arista Multilayer Switch must use FIPS-compliant mechanisms for authentication to a cryptographic module.
The Arista Multilayer Switch must encrypt all methods of configured authentication for the OSPF routing protocol.
The Arista Multilayer Switch must not enable the RIP routing protocol.
The Arista router must be configured to authenticate all routing protocol messages using NIST-validated FIPS 198-1 message authentication code algorithm.
The application server must utilize FIPS 140-2 approved encryption modules when authenticating users and processes.
The Arista network device must use FIPS 140-2 approved algorithms for authentication to a cryptographic module.
The application must use mechanisms meeting the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.
The BlackBerry Enterprise Mobility Server (BEMS) server must be configured to enable FIPS mode.
The Central Log Server must use FIPS-validated SHA-1 or higher hash function to protect the integrity of keyed-hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, hash-only applications, and digital signature verification (legacy use only).
The Central Log Server must use FIPS-validated SHA-2 or higher hash function for digital signature generation and verification (non-legacy use).
FIPS mode must be enabled on all Docker Engine - Enterprise nodes.
The FortiGate device must use FIPS 140-2 approved algorithms for authentication to a cryptographic module.
Forescout must use FIPS 140-2 approved algorithms for authentication to a cryptographic module.
The HP FlexFabric Switch must encrypt all methods of configured authentication for routing protocols.
The HP FlexFabric Switch must use NIST-validated FIPS 140-2 cryptography to implement authentication encryption mechanisms for routing protocols.
DoD-approved encryption must be implemented to protect the confidentiality and integrity of remote access sessions, information during preparation for transmission, information during reception, and information during transmission in addition to enforcing replay-resistant authentication mechanisms for network access to privileged accounts.
The HYCU server must use FIPS-validated algorithms for authentication to a cryptographic module and Keyed-Hash Message Authentication Code (HMAC) to protect the integrity and confidentiality of remote maintenance sessions.
The DataPower Gateway must use mechanisms meeting the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.
DB2 must use NIST FIPS 140-2 validated cryptographic modules for cryptographic operations.
The MQ Appliance messaging server must utilize FIPS 140-2 approved encryption modules when authenticating users and processes.
The WebSphere Liberty Server must use FIPS 140-2 approved encryption modules when authenticating users and processes.
The MQ Appliance network device must use mechanisms meeting the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.
The WebSphere Application Server must utilize FIPS 140-2-approved encryption modules when authenticating users and processes.
The IBM z/VM TCP/IP VMSSL command operands must be configured properly.
The Ivanti MobileIron Core server must use FIPS-validated SHA-2 or higher hash function to protect the integrity of keyed-hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, and hash-only applications.
MobileIron Sentry must use FIPS 140-2 approved algorithms for authentication to a cryptographic module.
The ISEC7 EMM Suite must use FIPS-validated SHA-2 or higher hash function for digital signature generation and verification (non-legacy use).
The Juniper router must be configured to use encryption for routing protocol authentication.
The Juniper router must be configured to authenticate all routing protocol messages using NIST-validated FIPS 140-2 message authentication code algorithm.
The layer 2 switch must authenticate all VLAN Trunk Protocol (VTP) messages with a hash function using the most secured cryptographic algorithm available.
The Juniper SRX Services Gateway VPN must use FIPS 140-2 compliant mechanisms for authentication to a cryptographic module.
The Mainframe Product must use mechanisms meeting the requirements of applicable federal laws, Executive orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.
Message formats must be set to use SMime.
Run in FIPS compliant mode must be enforced.
S/Mime interoperability with external clients for message handling must be configured.
S/Mime interoperability with external clients for message handling must be configured.
Message formats must be set to use SMime.
All SCOM servers must be configured for FIPS 140-2 compliance.
SharePoint must implement required cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.
SharePoint must use mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.
SQL Server must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations.
ONTAP must be configured to implement cryptographic mechanisms using FIPS 140-2.
The network device must use FIPS 140-2 approved algorithms for authentication to a cryptographic module.
Nutanix AOS pam_unix.so module must be configured in the password-auth file to use a FIPS 140-2 approved cryptographic hashing algorithm for system authentication.
OHS must have the LoadModule ossl_module directive enabled to meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance when encrypting stored data.
OHS must have the SSLFIPS directive enabled to meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance when encrypting stored data.
OHS must have the SSLEngine, SSLProtocol, and SSLWallet directives enabled to meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance when encrypting stored data.
OHS must have the SSLCipherSuite directive enabled to meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance when encrypting stored data.
OHS must have the LoadModule ossl_module directive enabled to meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.
OHS must have the SSLFIPS directive enabled to meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.
OHS must have the SSLEngine, SSLProtocol, and SSLWallet directives enabled and configured to meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.
OHS must have the SSLCipherSuite directive enabled to meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.
Oracle WebLogic must use cryptographic modules that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance when encrypting stored data.
Oracle WebLogic must utilize FIPS 140-2 approved encryption modules when authenticating users and processes.
Prisma Cloud Compute release tar distributions must have an associated SHA-256 digest.
The Riverbed NetProfiler must be configured to implement cryptographic mechanisms using a FIPS 140-2/140-3 validated algorithm to protect the confidentiality and integrity of all cryptographic functions.
The router must be configured to use encryption for routing protocol authentication.
The router must be configured to authenticate all routing protocol messages using NIST-validated FIPS 198-1 message authentication code algorithm.
Riverbed Optimization System (RiOS) must use mechanisms meeting the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.
The SDN controller must be configured to authenticate southbound Application Program Interface (API) control-plane messages received from SDN-enabled network elements using a FIPS-approved message authentication code algorithm.
The SDN controller must be configured to authenticate northbound Application Program Interface (API) messages received from business applications and management systems using a FIPS-approved message authentication code algorithm.
The SDN controller must be configured to authenticate received southbound Application Program Interface (API) management-plane messages using a FIPS-approved message authentication code algorithm.
Northbound API traffic received by the SDN controller must be authenticated using a FIPS-approved message authentication code algorithm.
The SEL-2740S must be configured to establish trust relationships with parent OTSDN Controller(s).
Innoslate must use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data during electronic dissemination using remote access.
Splunk Enterprise must use TLS 1.2 and SHA-2 or higher cryptographic algorithms.
Symantec ProxySG must be configured to use only FIPS 140-2 approved algorithms for authentication to a cryptographic module with any application or protocol.
The TippingPoint TPS must have FIPS Mode enforced.
The Tanium Operating System (TanOS) must use FIPS-validated SHA-2 or higher hash function to protect the integrity of hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, and hash-only applications.
The UEM server must use FIPS-validated SHA-2 or higher hash function to protect the integrity of keyed-hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, and hash-only applications.
The application must use FIPS-validated SHA-256 or higher hash function for digital signature generation and verification.
The Horizon Connection Server must only use FIPS 140-2 validated cryptographic modules.
The VPN Gateway must use FIPS-validated SHA-2 or higher hash function to protect the integrity of hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, hash-only applications, and digital signature verification.
The Apache web server must use cryptography to protect the integrity of remote sessions.
Tomcat must use FIPS-validated ciphers on secured connectors.
Apple iOS/iPadOS 17 must not include applications with the following characteristics: access to Siri when the device is locked.
The macOS system must implement approved ciphers within the SSH server configuration to protect the confidentiality of SSH connections.
The macOS system must implement approved Message Authentication Codes (MACs) within the SSH server configuration.
The macOS system must implement approved Key Exchange Algorithms within the SSH server configuration.
The macOS system must implement approved ciphers to protect the confidentiality of SSH connections.
The macOS system must implement approved Message Authentication Codes (MACs).
The macOS system must implement approved Key Exchange Algorithms.
The macOS system must implement approved ciphers within the SSH client configuration to protect the confidentiality of SSH connections.
The macOS system must implement approved Message Authentication Codes (MACs) within the SSH client configuration.
The macOS system must implement approved Key Exchange Algorithms within the SSH client configuration.
The macOS system must limit SSHD to FIPS-compliant connections.
The macOS system must limit SSH to FIPS-compliant connections.
The Ubuntu operating system must employ a FIPS 140-2 approved cryptographic hashing algorithms for all created and stored passwords.
The Ubuntu operating system must encrypt all stored passwords with a FIPS 140-2 approved cryptographic hashing algorithm.
PostgreSQL must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations.
The DBMS must be configured on a platform that has a NIST certified FIPS 140-2 or 140-3 installation of OpenSSL.
The Cisco ASA must be configured to use FIPS-validated SHA-2 at 384 bits or higher for Internet Key Exchange (IKE) Phase 1.
The Cisco router must be configured to enable routing protocol authentication using FIPS 198-1 algorithms with keys not exceeding 180 days of lifetime.
The Cisco switch must authenticate all VLAN Trunk Protocol (VTP) messages with a hash function using the most secured cryptographic algorithm available.
The Cisco switch must be configured to enable routing protocol authentication using FIPS 198-1 algorithms with keys not exceeding 180 days of lifetime.
The Cisco ISE must use FIPS-validated SHA-2 (or greater) to protect the integrity of hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, and hash-only applications.
The Cisco switch must be configured to use encryption for routing protocol authentication.
The Cisco switch must be configured to authenticate all routing protocol messages using NIST-validated FIPS 198-1 message authentication code algorithm.
The container platform must use FIPS-validated SHA-2 or higher hash function for digital signature generation and verification (non-legacy use).
The EDB Postgres Advanced Server must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations.
The EDB Postgres Advanced Server must be configured on a platform that has a NIST-certified FIPS 140-2 or 140-3 installation of OpenSSL.
The DBMS must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations.
Google Android 14 allowlist must be configured to not include applications with the following characteristics:
- Back up mobile device (MD) data to non-DOD cloud servers (including user and application access to cloud backup services);
- Transmit MD diagnostic data to non-DOD servers;
- Voice assistant application if available when MD is locked;
- Voice dialing application if available when MD is locked;
- Allows synchronization of data or applications between devices associated with user; and
- Allows unencrypted (or encrypted but not FIPS 140-2/140-3 validated) data sharing with other MDs or printers.
The operating system must use mechanisms meeting the requirements of applicable federal laws, Executive orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.
The HPE 3PAR OS must be configured to initialize its FIPS module to use mechanisms meeting the requirements of applicable federal laws, Executive orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.
The HPE 3PAR OS cimserver process must be properly configured to operate in FIPS mode in order to use mechanisms meeting the requirements of applicable federal laws, executive orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.
The HPE 3PAR OS WSAPI process must be properly configured to operate in FIPS mode in order to use mechanisms meeting the requirements of applicable federal laws, executive orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.
AIX must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
IBM z/OS SSH daemon must be configured to use a FIPS 140-2 compliant cryptographic algorithm.
IBM z/OS SSL encryption options for the TN3270 Telnet Server must be specified properly for each statement that defines a SECUREPORT or within the TELNETGLOBALS.
NIST FIPS-validated cryptography must be used to protect passwords in the security database.
The SSH daemon must be configured to use a FIPS 140-2 compliant cryptographic algorithm.
IBM z/OS SSL encryption options for the TN3270 Telnet server must be specified properly for each statement that defines a SECUREPORT or within the TELNETGLOBALS.
The Juniper layer 2 switch must be configured to disable all dynamic VLAN registration protocols.
The ICS must be configured to audit the execution of privileged functions such as accounts additions and changes.
The Juniper router must be configured to authenticate all routing protocol messages using NIST-validated FIPS 198-1 message authentication code algorithm.
The Juniper EX switch must be configured to use FIPS 140-2 approved algorithms for authentication to a cryptographic module.
MarkLogic Server must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations and protect classified information in accordance with the requirements of the data owner.
MariaDB must use NIST FIPS 140-2 validated cryptographic modules for cryptographic operations.
MongoDB must use NIST FIPS 140-2-validated cryptographic modules for cryptographic operations.
MongoDB must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations.
Consistent MIME handling must be enabled for all Office 365 ProPlus programs.
The MIME Sniffing safety feature must be enabled in all Office programs.
Object Caching Protection must be enabled in all Office programs.
Windows 10 must be configured to prioritize ECC Curves with longer key lengths first.
Kerberos encryption types must be configured to prevent the use of DES and RC4 encryption suites.
Windows 11 must be configured to prioritize ECC Curves with longer key lengths first.
Windows Server 2019 Kerberos encryption types must be configured to prevent the use of DES and RC4 encryption suites.
Windows Server 2022 Kerberos encryption types must be configured to prevent the use of DES and RC4 encryption suites.
Multi-Protocol Labeled Switching (MPLS) protocols deployed to build Label-Switch Path (LSP) tunnels must authenticate all messages with a hash function using the most secured cryptographic algorithm available.
The DBMS must use NIST-validated FIPS 140-2-compliant cryptography for authentication mechanisms.
The DBMS must implement required cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.
The DBMS must use NIST-validated FIPS 140-2 or 140-3 compliant cryptography for authentication mechanisms.
The DBMS must implement required cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.
The Oracle Linux 7 operating system must implement DoD-approved encryption to protect the confidentiality of SSH connections.
The OL 8 "pam_unix.so" module must be configured in the system-auth file to use a FIPS 140-2 approved cryptographic hashing algorithm for system authentication.
The OL 8 "pam_unix.so" module must be configured in the password-auth file to use a FIPS 140-2 approved cryptographic hashing algorithm for system authentication.
OL 8 must prevent system daemons from using Kerberos for authentication.
The krb5-workstation package must not be installed on OL 8.
The krb5-server package must not be installed on OL 8.
The MySQL Database Server 8.0 must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations.
Automation Controller must implement cryptography mechanisms to protect the integrity of information.
Redis Enterprise DBMS must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations.
OpenShift must use FIPS-validated SHA-2 or higher hash function for digital signature generation and verification (nonlegacy use).
The RHEL 8 pam_unix.so module must be configured in the password-auth file to use a FIPS 140-2 approved cryptographic hashing algorithm for system authentication.
RHEL 8 must prevent system daemons from using Kerberos for authentication.
The krb5-workstation package must not be installed on RHEL 8.
The Red Hat Enterprise Linux 7 operating system must implement DoD-approved encryption to protect the confidentiality of SSH connections.
The SUSE operating system must employ FIPS 140-2 approved cryptographic hashing algorithm for system authentication (login.defs).
The SUSE operating system must employ FIPS 140-2-approved cryptographic hashing algorithms for all stored passwords.
The SUSE operating system must configure the Linux Pluggable Authentication Modules (PAM) to only store encrypted representations of passwords.
The krb5-server package must not be installed on RHEL 8.
The RHEL 8 pam_unix.so module must be configured in the system-auth file to use a FIPS 140-2 approved cryptographic hashing algorithm for system authentication.
RHEL 9 libreswan package must be installed.
The SUSE operating system must implement DoD-approved encryption to protect the confidentiality of SSH remote connections.
RHEL 9 password-auth must be configured to use a sufficient number of hashing rounds.
RHEL 9 system-auth must be configured to use a sufficient number of hashing rounds.
RHEL 9 shadow password suite must be configured to use a sufficient number of hashing rounds.
RHEL 9 must prevent system daemons from using Kerberos for authentication.
RHEL 9 must have the packages required for encrypting offloaded audit logs installed.
RHEL 9 must employ FIPS 140-3 approved cryptographic hashing algorithms for all stored passwords.
RHEL 9 must use mechanisms meeting the requirements of applicable federal laws, executive orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.
The operating system must use mechanisms for authentication to a cryptographic module meeting the requirements of applicable federal laws, Executive orders, directives, policies, regulations, standards, and guidance for such authentication.
Splunk Enterprise must be installed in FIPS mode to implement NIST FIPS-approved cryptography for all cryptographic functions.
Samsung Android must be configured to not allow installation of applications with the following characteristics:
- Back up MD data to non-DOD cloud servers (including user and application access to cloud backup services);
- Transmit MD diagnostic data to non-DOD servers;
- Voice assistant application if available when MD is locked;
- Voice dialing application if available when MD is locked;
- Allows synchronization of data or applications between devices associated with user; and
- Allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.
Samsung Android's Work profile must be configured to not allow installation of applications with the following characteristics:
- Back up MD data to non-DOD cloud servers (including user and application access to cloud backup services);
- Transmit MD diagnostic data to non-DOD servers;
- Voice assistant application if available when MD is locked;
- Voice dialing application if available when MD is locked;
- Allows synchronization of data or applications between devices associated with user; and
- Allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.
The VMM must use mechanisms meeting the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.
VAMI must enable FIPS mode.
The vCenter Server must enable FIPS-validated cryptography.
The Photon operating system must use an OpenSSH server version that does not support protocol 1.
VMware Postgres must use FIPS 140-2 approved Transport Layer Security (TLS) ciphers.
Envoy must be configured to operate in FIPS mode.
The Photon operating system must use mechanisms meeting the requirements of applicable federal laws, Executive orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.
The vCenter VAMI service must enable FIPS mode.
The web server must use cryptographic modules that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance when encrypting stored data.
The web server must use cryptographic modules that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.
The EDB Postgres Advanced Server must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for all cryptographic operations including generation of cryptographic hashes and data protection.
The EDB Postgres Advanced Server must be configured on a platform that has a NIST certified FIPS 140-2 or 140-3 installation of OpenSSL.
The BIG-IP appliance must be configured to use mechanisms meeting the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.
Ubuntu 22.04 LTS must encrypt all stored passwords with a FIPS 140-3-approved cryptographic hashing algorithm.
Google Android 15 allow list must be configured to not include applications with the following characteristics:
- Backs up MD data to non-DOD cloud servers (including user and application access to cloud backup services);
- Transmits MD diagnostic data to non-DOD servers;
- Voice assistant application if available when MD is locked;
- Voice dialing application if available when MD is locked;
- Allows synchronization of data or applications between devices associated with user;
- Payment processing;
- Allows unencrypted (or encrypted but not FIPS 140-2/140-3 validated) data sharing with other MDs or printers; and
- Backs up its own data to a remote system.
Google Android 15 allow list must be configured to not include artificial intelligence (AI) applications that process device data in the cloud, including Google Gemini.
The ISEC7 SPHERE must use FIPS-validated SHA-2 or higher hash function for digital signature generation and verification (nonlegacy use).
The Ivanti EPMM server must use FIPS-validated SHA-2 or higher hash function to protect the integrity of keyed-hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, and hash-only applications.
Sentry must use FIPS 140-2 approved algorithms for authentication to a cryptographic module.
The Juniper EX switch must be configured to use FIPS 140-2/140-3 validated algorithms for authentication to a cryptographic module.
FIPS mode must be enabled.
Rancher RKE2 must protect authenticity of communications sessions with the use of FIPS-validated 140-2 or 140-3 security requirements for cryptographic modules.
SLEM 5 must employ FIPS 140-2/140-3-approved cryptographic hashing algorithms for system authentication.
SLEM 5 shadow password suite must be configured to use a sufficient number of hashing rounds.
SLEM 5 must employ FIPS 140-2/140-3 approved cryptographic hashing algorithm for system authentication (login.defs).
Samsung Android's Work profile must be configured to not allow installation of applications with the following characteristics:
- Back up MD data to non-DOD cloud servers (including user and application access to cloud backup services);
- Transmit MD diagnostic data to non-DOD servers;
- Voice assistant application if available when MD is locked;
- Voice dialing application if available when MD is locked;
- Allows synchronization of data or applications between devices associated with user; and
- Allows unencrypted (or encrypted but not FIPS 140-3 validated) data sharing with other MDs or printers.
- Apps which backup their own data to a remote system.
The TOSS pam_unix.so module must be configured in the password-auth file to use a FIPS 140-2-approved cryptographic hashing algorithm for system authentication.
The TOSS pam_unix.so module must be configured in the system-auth file to use a FIPS 140-2-approved cryptographic hashing algorithm for system authentication.
The NSX Tier-0 Gateway router must be configured to use encryption for Open Shortest Path First (OSPF) routing protocol authentication.
Apple iOS/iPadOS 18 must not include applications with the following characteristics: access to Siri when the device is locked.
Apple iOS/iPadOS 18 allow list must be configured to not include applications with the following characteristics: - Backs up MD data to non-DOD cloud servers (including user and application access to cloud backup services);- Transmits MD diagnostic data to non-DOD servers;- Allows synchronization of data or applications between devices associated with user; and- Allows unencrypted (or encrypted but not FIPS 140-3 validated) data sharing with other MDs or printers.- Apps which backup their own data to a remote system.