Enable FIPS Mode in GRUB2
AAA Services must be configured to protect the confidentiality and integrity of all information at rest.
The application server must protect the confidentiality and integrity of all information at rest.
The application server must employ cryptographic mechanisms to ensure confidentiality and integrity of all information at rest when stored off-line.
The application must protect the confidentiality and integrity of stored information when required by DoD policy or the information owner.
The DNSSEC keys used with the BIND 9.x implementation must be owned by a privileged account.
The DNSSEC keys used with the BIND 9.x implementation must be group owned by a privileged account.
Permissions assigned to the DNSSEC keys used with the BIND 9.x implementation must enforce read-only access to the key owner and deny access to all other users.
FIPS mode must be enabled on all Docker Engine - Enterprise nodes.
Docker Secrets must be used to store configuration files and small amounts of user-generated data (up to 500 kb in size) in Docker Enterprise.
The DNS server implementation must protect the confidentiality and integrity of secret/private cryptographic keys at rest and the integrity of DNS information at rest.
The FortiGate device must only allow authorized administrators to view or change the device configuration, system files, and other files stored either in the device or on removable media (such as a flash drive).
CounterACT must allow only authorized administrators to view or change the device configuration, system files, and other files stored either in the device or on removable media.
Forescout must only allow authorized administrators to view or change the device configuration, system files, and other files stored either in the device or on removable media (such as a flash drive).
IBM Aspera Faspex must implement cryptographic mechanisms to prevent unauthorized disclosure or modification of all information that requires at rest protection.
IBM Aspera Shares must implement cryptographic mechanisms to prevent unauthorized disclosure or modification of all information that requires at rest protection.
The MQ Appliance messaging server must implement cryptography mechanisms to protect the integrity of the remote access session.
DB2 must protect the confidentiality and integrity of all information at rest.
IBM z/VM tapes must use Tape Encryption.
JBoss file permissions must be configured to protect the confidentiality and integrity of application files.
The Mainframe Product must protect the confidentiality and integrity of all information at rest.
Microsoft Android 11 must be configured to enable encryption for data at rest on removable storage media or alternately, the use of removable storage media must be disabled.
Azure SQL Database must protect the confidentiality and integrity of all information at rest.
Exchange Public Folder stores must be retained until backups are complete.
The Exchange Public Folder database must not be overwritten by a restore.
Exchange Mailboxes must be retained until backups are complete.
The Exchange Mailbox database must not be overwritten by a restore.
Exchange email forwarding must be restricted.
Exchange email-forwarding SMTP domains must be restricted.
Document metadata for password protected files must be protected.
The encryption type for password protected Open XML files must be set.
The encryption type for password protected Office 97 thru Office 2003 must be set.
Passwords for secured documents must be enforced.
Document metadata for password protected files must be protected.
The encryption type for password protected Open XML files must be set.
The encryption type for password protected Office 97 thru Office 2003 must be set.
The Database Master Key must be encrypted by the Service Master Key, where a Database Master Key is required and another encryption method has not been specified.
Database Master Key passwords must not be stored in credentials within the database.
Symmetric keys (other than the database master key) must use a DoD certificate to encrypt the key.
SQL Server must protect data at rest and ensure confidentiality and integrity of data.
The Service Master Key must be backed up, stored offline and off-site.
The Windows 2012 DNS Server must protect secret/private cryptographic keys while at rest.
ONTAP must enforce administrator privileges based on their defined roles.
The network device must only allow authorized administrators to view or change the device configuration, system files, and other files stored either in the device or on removable media (such as a flash drive).
Nutanix AOS must protect the confidentiality and integrity of all information at rest.
Samsung Android must be configured to enable encryption for data at rest on removable storage media or alternatively, the use of removable storage media must be disabled.
Samsung Android must be configured to enable encryption for data at rest on removable storage media or, alternately, the use of removable storage media must be disabled.
The Tanium Operating System (TanOS) must use FIPS-validated encryption and hashing algorithms to protect the confidentiality and integrity of operating system configuration and user-generated data stored on the host.
Apple iOS/iPadOS 16 must require a valid password be successfully entered before the mobile device data is unencrypted.
The Apple iOS must be configured to disable automatic transfer of diagnostic data to an external device other than an MDM service with which the device has enrolled.
Apple iOS/iPadOS 17 must require a valid password be successfully entered before the mobile device data is unencrypted.
Apple iOS/iPadOS 17 must implement the management setting: limit Ad Tracking.
Apple iOS/iPadOS 16 must implement the management setting: limit Ad Tracking.
The macOS system must implement cryptographic mechanisms to protect the confidentiality and integrity of all information at rest.
The macOS system must implement cryptographic mechanisms to protect the confidentiality and integrity of all information at rest.
Ubuntu operating systems handling data requiring data at rest protections must employ cryptographic mechanisms to prevent unauthorized disclosure and modification of the information at rest.
The macOS system must enforce FileVault.
Ubuntu operating systems handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorized disclosure and modification of the information at rest.
PostgreSQL must protect the confidentiality and integrity of all information at rest.
The Cisco ISE must only allow authorized administrators to view or change the device configuration, system files, and other files stored.
The EDB Postgres Advanced Server must protect the confidentiality and integrity of all information at rest.
The DBMS must protect the confidentiality and integrity of all information at rest.
Browser history must be saved.
The operating system must protect the confidentiality and integrity of all information at rest.
AIX must protect the confidentiality and integrity of all information at rest.
ACF2 SECVOLS GSO record value must be set to VOLMASK(). Any local changes are justified and documented with the ISSO.
ACF2 RESVOLS GSO record value must be set to Volmask(-). Any other setting requires documentation justifying the change.
The IBM z/OS systems requiring data at rest protection must properly employ IBM DS8880 or equivalent hardware solutions for full disk encryption.
The IBM z/OS systems requiring data-at-rest protection must properly employ IBM DS8880 or equivalent hardware solutions for full disk encryption.
The ICS must be configured to prevent nonprivileged users from executing privileged functions.
The Juniper device must be configured to only allow authorized administrators to view or change the device configuration, system files, and other files stored either in the device or on removable media (such as a flash drive).
MarkLogic Server must protect the confidentiality and integrity of all information at rest.
MariaDB must protect the confidentiality and integrity of all information at rest.
MongoDB must protect the confidentiality and integrity of all information at rest.
Exchange mailboxes must be retained until backups are complete.
Userdata persistence must be disallowed (Internet zone).
Userdata persistence must be disallowed (Restricted Sites zone).
Office applications must be configured to specify encryption type in password-protected Office 97-2003 files.
Office applications must be configured to specify encryption type in password-protected Office Open XML files.
The production IIS 10.0 web server must utilize SHA2 encryption for the Machine Key.
The Database Master Key encryption password must meet DOD password complexity requirements.
The Database Master Key must be encrypted by the Service Master Key, where a Database Master Key is required and another encryption method has not been specified.
The Certificate used for encryption must be backed up, stored offline and off-site.
Windows 10 information systems must use BitLocker to encrypt all disks to protect the confidentiality and integrity of all information at rest.
Windows 10 systems must use a BitLocker PIN for pre-boot authentication.
Windows 10 systems must use a BitLocker PIN with a minimum length of six digits for pre-boot authentication.
SQL Server must protect the confidentiality and integrity of all information at rest.
The Master Key must be backed up, stored offline and off-site.
Windows 10 nonpersistent VM sessions must not exceed 24 hours.
Windows 11 nonpersistent VM sessions must not exceed 24 hours.
Systems requiring data at rest protections must employ cryptographic mechanisms to prevent unauthorized disclosure and modification of the information at rest.
Windows Server 2019 systems requiring data at rest protections must employ cryptographic mechanisms to prevent unauthorized disclosure and modification of the information at rest.
Windows Server 2022 systems requiring data at rest protections must employ cryptographic mechanisms to prevent unauthorized disclosure and modification of the information at rest.
All OL 8 local disk partitions must implement cryptographic mechanisms to prevent unauthorized disclosure or modification of all information that requires at-rest protection.
The DBMS must take needed steps to protect data at rest and ensure confidentiality and integrity of application data.
The DBMS must take needed steps to protect data at rest and ensure confidentiality and integrity of application data.
The Oracle Linux operating system must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect data requiring data-at-rest protections in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
The MySQL Database Server 8.0 must protect the confidentiality and integrity of all information at rest.
Automation Controller must implement cryptography mechanisms to protect the integrity of information.
Redis Enterprise DBMS must protect the confidentiality and integrity of all information at rest.
All RHEL 8 local disk partitions must implement cryptographic mechanisms to prevent unauthorized disclosure or modification of all information that requires at rest protection.
The Red Hat Enterprise Linux operating system must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect data requiring data-at-rest protections in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
All SUSE operating system persistent disk partitions must implement cryptographic mechanisms to prevent unauthorized disclosure or modification of all information that requires at rest protection.
RHEL 9 local disk partitions must implement cryptographic mechanisms to prevent unauthorized disclosure or modification of all information that requires at rest protection.
All SUSE operating system persistent disk partitions must implement cryptographic mechanisms to prevent unauthorized disclosure or modification of all information that requires at-rest protection.
The operating system must protect the confidentiality and integrity of information at rest.
The VMM must protect the confidentiality and integrity of all information at rest.
The vCenter Server must enable FIPS-validated cryptography.
Information at rest must be encrypted using a DoD-accepted algorithm to protect the confidentiality and integrity of the information.
The Windows DNS Server must protect secret/private cryptographic keys while at rest.
Ubuntu 22.04 LTS must implement cryptographic mechanisms to prevent unauthorized disclosure and modification of all information that requires protection at rest.
Dragos must use FIPS-validated encryption and hashing algorithms to protect the confidentiality and integrity of application configuration files and user-generated data stored or aggregated on the device.
The IBM z/OS systems requiring data at rest protection must properly employ IBM DS8880 or equivalent hardware solutions for full disk encryption.
The IBM z/OS systems requiring data-at-rest protection must properly employ IBM DS8880 or equivalent hardware solutions for full disk encryption.
The Certificate used for encryption must be backed up and stored in a secure location that is not on the SQL Server.
The Service Master Key must be backed up and stored in a secure location that is not on the SQL Server.
The Master Key must be backed up and stored in a secure location that is not on the SQL Server.
Windows 10 information systems must use BitLocker to encrypt all disks to protect the confidentiality and integrity of all information at rest.
Windows 10 systems must use a BitLocker PIN for pre-boot authentication.
Windows 10 systems must use a BitLocker PIN with a minimum length of six digits for pre-boot authentication.
Systems requiring data at rest protections must employ cryptographic mechanisms to prevent unauthorized disclosure and modification of the information at rest.
Windows Server 2019 systems requiring data at rest protections must employ cryptographic mechanisms to prevent unauthorized disclosure and modification of the information at rest.
Windows Server 2022 systems requiring data at rest protections must employ cryptographic mechanisms to prevent unauthorized disclosure and modification of the information at rest.
All OL 8 local disk partitions must implement cryptographic mechanisms to prevent unauthorized disclosure or modification of all information that requires at-rest protection.
All SLEM 5 persistent disk partitions must implement cryptographic mechanisms to prevent unauthorized disclosure or modification of all information that requires at-rest protection.
All SUSE operating system persistent disk partitions must implement cryptographic mechanisms to prevent unauthorized disclosure or modification of all information that requires at rest protection.
All SUSE operating system persistent disk partitions must implement cryptographic mechanisms to prevent unauthorized disclosure or modification of all information that requires at-rest protection.
All TOSS local disk partitions must implement cryptographic mechanisms to prevent unauthorized disclosure or modification of all information that requires at rest protection.
The NSX Manager must assign users/accounts to organization-defined roles configured with approved authorizations.
Apple iOS/iPadOS 18 must require a valid password be successfully entered before the mobile device data is unencrypted.
Apple iOS/iPadOS 18 must implement the management setting: limit Ad Tracking.