Deactivate Wireless Network Interfaces
Install the OpenSSH Server Package
Disable Bluetooth Kernel Module
Enable the OpenSSH Service
Set kernel parameter 'crypto.fips_enabled' to 1
Configure SSH Client to Use FIPS 140-2 Validated Ciphers: openssh.config
Install the OpenSSH Client and Server Package
A VPN must be used to protect directory network traffic for directory service implementation spanning enclave boundaries.
The Apache web server must use encryption strength in accordance with the categorization of data hosted by the Apache web server when remote connections are provided.
The Apache web server cookies, such as session cookies, sent to the client using SSL/TLS must not be compressed.
Cookies exchanged between the Apache web server and the client, such as session cookies, must have cookie properties set to prohibit client-side scripts from reading the cookie data.
Cookies exchanged between the Apache web server and the client, such as session cookies, must have cookie properties set to force the encryption of cookies.
An Apache web server must maintain the confidentiality of controlled information during transmission through the use of an approved TLS version.
The application server must protect the confidentiality and integrity of transmitted information through the use of an approved TLS version.
The application server must remove all export ciphers to protect the confidentiality and integrity of transmitted information.
The application must protect the confidentiality and integrity of transmitted information.
The BlackBerry UEM server must connect to [assignment: [SQL Server]] with an authenticated and secure (encrypted) connection to protect the confidentiality and integrity of transmitted information.
The BlackBerry Enterprise Mobility Server (BEMS) must protect the confidentiality and integrity of transmitted information through the use of an approved TLS version.
The BlackBerry Enterprise Mobility Server (BEMS) must remove all export ciphers to protect the confidentiality and integrity of transmitted information.
The BIND 9.x server implementation must uniquely identify and authenticate the other DNS server before responding to a server-to-server transaction, zone transfer and/or dynamic update request using cryptographically based bidirectional authentication to protect the integrity of the information in transit.
The Central Log Server must be configured to protect the confidentiality and integrity of transmitted information.
Citrix License Server must protect the confidentiality and integrity of transmitted information.
XenDesktop License Server must protect the confidentiality and integrity of transmitted information.
Citrix Linux Virtual Delivery Agent must implement DoD-approved encryption.
Citrix Receiver must implement DoD-approved encryption.
Citrix StoreFront server must accept Personal Identity Verification (PIV) credentials.
Citrix Windows Virtual Delivery Agent must implement DoD-approved encryption.
TCP socket binding for all Docker Engine - Enterprise nodes in a Universal Control Plane (UCP) cluster must be disabled.
The DNS server implementation must protect the integrity of transmitted information.
The CIM service must use DoD-approved encryption.
DoD-approved encryption must be implemented to protect the confidentiality and integrity of remote access sessions, information during preparation for transmission, information during reception, and information during transmission in addition to enforcing replay-resistant authentication mechanisms for network access to privileged accounts.
The Infoblox DNS server must protect the integrity of transmitted information.
The MQ Appliance messaging server must remove all export ciphers to protect the confidentiality and integrity of transmitted information.
The MQ Appliance messaging server must protect the confidentiality and integrity of transmitted information through the use of an approved TLS version.
The WebSphere Liberty Server must use FIPS 140-2 approved encryption modules when authenticating users and processes.
The WebSphere Liberty Server must remove all export ciphers to protect the confidentiality and integrity of transmitted information.
The WebSphere Application Server must utilize FIPS 140-2-approved encryption modules when authenticating users and processes.
The WebSphere Application Server must remove all export ciphers to protect the confidentiality and integrity of transmitted information.
The Infoblox system must be configured to must protect the integrity of transmitted information.
The ISEC7 EMM Suite must configure Enable HTTPS to use HTTP over SSL in Apache Tomcat.
SSL must be enabled on Apache Tomcat.
Tomcat SSL must be restricted except for ISEC7 EMM Suite tasks.
The ISEC7 EMM Suite must protect the confidentiality and integrity of transmitted information during preparation for transmission and during reception using cryptographic mechanisms.
The Jamf Pro EMM server must connect to [Authentication Gateway Service (AGS)] with an authenticated and secure (encrypted) connection to protect the confidentiality and integrity of transmitted information.
JBoss must be configured to use an approved TLS version.
Exchange OWA must use https.
Exchange must provide redundancy.
Exchange internal Receive connectors must require encryption.
Exchange internal Send connectors must require encryption.
Plain Text Options for outbound email must be configured.
The Windows 2012 DNS Server must protect the integrity of transmitted information.
Nutanix AOS must protect the confidentiality and integrity of transmitted information.
OHS must have the LoadModule ossl_module directive enabled to prevent unauthorized disclosure of information during transmission.
OHS must have the SSLFIPS directive enabled to prevent unauthorized disclosure of information during transmission.
OHS must have the SSLEngine, SSLProtocol, SSLWallet directives enabled and configured to prevent unauthorized disclosure of information during transmission.
OHS must have the SSLCipherSuite directive enabled to prevent unauthorized disclosure of information during transmission.
If using the WebLogic Web Server Proxy Plugin and configuring end-to-end SSL, OHS must have the SecureProxy directive enabled to prevent unauthorized disclosure of information during transmission.
OHS must have the WLSSLWallet directive enabled to prevent unauthorized disclosure of information during transmission.
If using the WebLogic Web Server Proxy Plugin and configuring end-to-end SSL, OHS must have the WebLogicSSLVersion directive enabled to prevent unauthorized disclosure of information during transmission.
If using the WebLogic Web Server Proxy Plugin and configuring SSL termination at OHS, OHS must have the WLProxySSL directive enabled to prevent unauthorized disclosure of information during transmission.
OHS must have the LoadModule ossl_module directive enabled to maintain the confidentiality of controlled information during transmission through the use of an approved TLS version.
OHS must have the SSLFIPS directive enabled to maintain the confidentiality of controlled information during transmission through the use of an approved TLS version.
OHS must have the SSLEngine, SSLProtocol, and SSLWallet directives enabled and configured to maintain the confidentiality of controlled information during transmission through the use of an approved TLS version.
OHS must have the SSLCipherSuite directive enabled to maintain the confidentiality of controlled information during transmission through the use of an approved TLS version.
Prisma Cloud Compute must protect the confidentiality and integrity of transmitted information.
Splunk Enterprise must use SSL to protect the confidentiality and integrity of transmitted information.
The Tanium Server must protect the confidentiality and integrity of transmitted information with cryptographic signing capabilities enabled to ensure the authenticity of communications sessions when making requests from Tanium Clients.
Tanium must be configured to communicate using TLS 1.2 Strict Only.
The Tanium application, SQL and Module servers must all be configured to communicate using TLS 1.2 Strict Only.
The Tanium application must be configured to communicate using TLS 1.2 Strict Only.
The Tanium Application, SQL, and Module servers must all be configured to communicate using TLS 1.2 Strict Only.
The SchUseStrongCrypto registry value must be set.
The SSLCipherSuite registry value must be set.
The UEM server must connect to [assignment: [list of applications]] and managed mobile devices with an authenticated and secure (encrypted) connection to protect the confidentiality and integrity of transmitted information.
The IPsec VPN Gateway must specify Perfect Forward Secrecy (PFS) during Internet Key Exchange (IKE) negotiation.
The VPN Gateway and Client must be configured to protect the confidentiality and integrity of transmitted information.
The Apache web server must use cryptography to protect the integrity of remote sessions.
The Apache web server must remove all export ciphers to protect the confidentiality and integrity of transmitted information.
TLS 1.2 must be used on secured HTTP connectors.
Tomcat must use FIPS-validated ciphers on secured connectors.
The macOS system must disable the SSHD service.
The macOS system must be configured with Bluetooth turned off unless approved by the organization.
The macOS system must disable Bluetooth when no approved device is connected.
The Ubuntu operating system must use SSH to protect the confidentiality and integrity of transmitted information unless otherwise protected by alternative physical safeguards, such as, at a minimum, a Protected Distribution System (PDS).
The Ubuntu operating system must disable all wireless network adapters.
The Ubuntu operating system must use SSH to protect the confidentiality and integrity of transmitted information.
The Cisco ASA must be configured to specify Perfect Forward Secrecy (PFS) for the IPsec Security Association (SA) during IKE Phase 2 negotiation.
The operating system must protect the confidentiality and integrity of transmitted information.
The operating system must protect the confidentiality and integrity of communications with wireless peripherals.
SSMC must employ strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions.
SSMC web server must use encryption strength in accordance with the categorization of data hosted by the web server when remote connections are provided.
The HPE 3PAR OS must be configured to restrict the encryption algorithms and protocols to comply with DOD-approved encryption to protect the confidentiality and integrity of remote access sessions.
AIX must protect the confidentiality and integrity of transmitted information during preparation for transmission and maintain the confidentiality and integrity of information during reception and disable all non-encryption network access methods.
IBM z/OS SSL encryption options for the TN3270 Telnet Server must be specified properly for each statement that defines a SECUREPORT or within the TELNETGLOBALS.
IBM z/OS SSL encryption options for the TN3270 Telnet server must be specified properly for each statement that defines a SECUREPORT or within the TELNETGLOBALS.
The ICS must be configured to use TLS 1.2, at a minimum.
IIS 10.0 website session IDs must be sent to the client using TLS.
Cookies exchanged between the IIS 10.0 website and the client must have cookie properties set to prohibit client-side scripts from reading the cookie data.
IIS 10.0 web server session IDs must be sent to the client using TLS.
An IIS 10.0 web server must maintain the confidentiality of controlled information during transmission through the use of an approved Transport Layer Security (TLS) version.
The IIS 10.0 web server must maintain the confidentiality of controlled information during transmission through the use of an approved Transport Layer Security (TLS) version.
Outgoing secure channel traffic must be encrypted or signed.
Outgoing secure channel traffic must be encrypted when possible.
Outgoing secure channel traffic must be signed when possible.
The system must be configured to require a strong session key.
The Windows SMB client must be configured to always perform SMB packet signing.
The Windows SMB server must be configured to always perform SMB packet signing.
Simultaneous connections to the internet or a Windows domain must be limited.
Outgoing secure channel traffic must be encrypted.
Outgoing secure channel traffic must be signed.
Domain controllers must require LDAP access signing.
The setting Domain member: Digitally encrypt or sign secure channel data (always) must be configured to Enabled.
The setting Domain member: Digitally encrypt secure channel data (when possible) must be configured to enabled.
The setting Domain member: Digitally sign secure channel data (when possible) must be configured to Enabled.
Windows Server 2016 must be configured to require a strong session key.
The setting Microsoft network client: Digitally sign communications (always) must be configured to Enabled.
The setting Microsoft network client: Digitally sign communications (if server agrees) must be configured to Enabled.
The setting Microsoft network server: Digitally sign communications (always) must be configured to Enabled.
The setting Microsoft network server: Digitally sign communications (if client agrees) must be configured to Enabled.
Windows Server 2019 domain controllers must require LDAP access signing.
Windows Server 2019 setting Domain member: Digitally encrypt or sign secure channel data (always) must be configured to Enabled.
Windows Server 2019 setting Domain member: Digitally encrypt secure channel data (when possible) must be configured to enabled.
Windows Server 2019 setting Domain member: Digitally sign secure channel data (when possible) must be configured to Enabled.
Windows Server 2019 must be configured to require a strong session key.
Windows Server 2019 setting Microsoft network client: Digitally sign communications (always) must be configured to Enabled.
Windows Server 2019 setting Microsoft network client: Digitally sign communications (if server agrees) must be configured to Enabled.
Windows Server 2019 setting Microsoft network server: Digitally sign communications (always) must be configured to Enabled.
Windows Server 2019 setting Microsoft network server: Digitally sign communications (if client agrees) must be configured to Enabled.
Windows Server 2022 domain controllers must require LDAP access signing.
Windows Server 2022 setting Domain member: Digitally encrypt or sign secure channel data (always) must be configured to Enabled.
Windows Server 2022 setting Domain member: Digitally encrypt secure channel data (when possible) must be configured to Enabled.
Windows Server 2022 setting Domain member: Digitally sign secure channel data (when possible) must be configured to Enabled.
Windows Server 2022 must be configured to require a strong session key.
Windows Server 2022 setting Microsoft network client: Digitally sign communications (always) must be configured to Enabled.
Windows Server 2022 setting Microsoft network client: Digitally sign communications (if server agrees) must be configured to Enabled.
Windows Server 2022 setting Microsoft network server: Digitally sign communications (always) must be configured to Enabled.
Windows Server 2022 setting Microsoft network server: Digitally sign communications (if client agrees) must be configured to Enabled.
Tunneling of classified traffic across an unclassified IP transport network or service provider backbone must be documented in the enclaves security authorization package and an Approval to Connect (ATC), or an Interim ATC must be issued by DISA prior to implementation.
DSAWG approval must be obtained before tunneling classified traffic outside the components local area network boundaries across a non-DISN or OCONUS DISN unclassified IP wide area network transport infrastructure.
Tunneling of classified traffic across an unclassified IP transport network must employ cryptographic algorithms in accordance with CNSS Policy No. 15.
OL 8 must implement NIST FIPS-validated cryptography for the following: To provision digital signatures, to generate cryptographic hashes, and to protect data requiring data-at-rest protections in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
The Oracle Linux operating system must be configured so that all networked systems have SSH installed.
The Oracle Linux operating system must be configured so that all networked systems use SSH for confidentiality and integrity of transmitted and received information as well as information during preparation for transmission.
OL 8 wireless network adapters must be disabled.
OL 8 Bluetooth must be disabled.
All OL 8 networked systems must have SSH installed.
All OL 8 networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.
Automation Controller must implement cryptography mechanisms to protect the integrity of information.
OpenShift must protect the confidentiality and integrity of transmitted information.
Cookies exchanged between any Automation Controller NGINX web server and any client, such as session cookies, must have security settings that disallow cookie access outside the originating Automation Controller NGINX web server and hosted application.
The Automation Controller NGINX web server must employ cryptographic mechanisms (TLS/DTLS/SSL) to prevent the unauthorized disclosure of information during transmission.
Automation Controller NGINX web servers must maintain the confidentiality of controlled information during transmission through the use of an approved TLS version.
The Red Hat Enterprise Linux operating system must be configured so that all networked systems have SSH installed.
The Red Hat Enterprise Linux operating system must be configured so that all networked systems use SSH for confidentiality and integrity of transmitted and received information as well as information during preparation for transmission.
All RHEL 8 networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.
The Red Hat Enterprise Linux operating system must be configured so that all wireless network adapters are disabled.
All RHEL 8 networked systems must have SSH installed.
All RHEL 9 networked systems must have SSH installed.
All RHEL 9 networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.
All networked SUSE operating systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.
The SUSE operating system wireless network adapters must be disabled unless approved and documented.
RHEL 9 must force a frequent session key renegotiation for SSH connections to the server.
RHEL 9 wireless network adapters must be disabled.
RHEL 9 must enable FIPS mode.
RHEL 9 must implement DOD-approved TLS encryption in the GnuTLS package.
RHEL 9 must implement DOD-approved encryption in the bind package.
Wireless network adapters must be disabled.
The operating system must protect the confidentiality of transmitted information.
The operating system must protect the integrity of transmitted information.
Splunk Enterprise must be configured to protect the confidentiality and integrity of transmitted information.
The VMM must protect the confidentiality and integrity of transmitted information.
The VMM must protect the confidentiality and integrity of communications with wireless peripherals.
The ESXi host must protect the confidentiality and integrity of transmitted information by isolating vMotion traffic.
The ESXi host must protect the confidentiality and integrity of transmitted information by protecting ESXi management traffic.
The ESXi host must protect the confidentiality and integrity of transmitted information by isolating IP-based storage traffic.
VAMI must be configured with FIPS 140-2 compliant ciphers for HTTPS connections.
VAMI must use cryptography to protect the integrity of remote sessions.
VAMI must implement Transport Layer Security (TLS) 1.2 exclusively.
Performance Charts must protect cookies from cross-site scripting (XSS).
Performance Charts must set the secure flag for cookies.
ESX Agent Manager must protect cookies from cross-site scripting (XSS).
Lookup Service must protect cookies from cross-site scripting (XSS).
Lookup Service must set the secure flag for cookies.
The ESXi host must protect the confidentiality and integrity of transmitted information by isolating ESXi management traffic.
The Photon operating system must configure sshd to use approved encryption algorithms.
Envoy must be configured to operate in FIPS mode.
Envoy must use only Transport Layer Security (TLS) 1.2 for the protection of client connections.
The Security Token Service must protect cookies from cross-site scripting (XSS).
The Security Token Service must set the secure flag for cookies.
vSphere UI must protect cookies from cross-site scripting (XSS).
vSphere UI must set the secure flag for cookies.
The Photon operating system must have the OpenSSL FIPS provider installed to protect the confidentiality of remote access sessions.
The vCenter STS service must be configured to use strong encryption ciphers.
The vCenter VAMI service must enable FIPS mode.
The web server must employ cryptographic mechanisms (TLS/DTLS/SSL) preventing the unauthorized disclosure of information during transmission.
Web server session IDs must be sent to the client using SSL/TLS.
Web server cookies, such as session cookies, sent to the client using SSL/TLS must not be compressed.
Cookies exchanged between the web server and the client, such as session cookies, must have cookie properties set to prohibit client-side scripts from reading the cookie data.
Cookies exchanged between the web server and the client, such as session cookies, must have cookie properties set to force the encryption of cookies.
A web server must maintain the confidentiality of controlled information during transmission through the use of an approved TLS version.
The web server must remove all export ciphers to protect the confidentiality and integrity of transmitted information.
The Windows DNS Server must protect the integrity of transmitted information.
Ubuntu 22.04 LTS must have SSH installed.
Ubuntu 22.04 LTS must use SSH to protect the confidentiality and integrity of transmitted information.
Ubuntu 22.04 LTS must disable all wireless network adapters.
The Enterprise Voice, Video, and Messaging Endpoint must be configured to use FIPS-compliant algorithms for network traffic.
The Enterprise Voice, Video, and Messaging Session Manager must be configured to protect the confidentiality and integrity of transmitted configuration files, signaling, and media streams.
The F5 BIG-IP appliance IPsec VPN Gateway must specify Perfect Forward Secrecy (PFS) during Internet Key Exchange (IKE) negotiation.
The ISEC7 SPHERE must protect the confidentiality and integrity of transmitted information during preparation for transmission and during reception using cryptographic mechanisms.
The ISEC7 SPHERE must configure Enable HTTPS to use HTTP over SSL in Apache Tomcat.
Tomcat SSL must be restricted except for ISEC7 SPHERE tasks.
FIPS mode must be enabled.
The Automation Controller NGINX web server must employ cryptographic mechanisms (TLS/DTLS/SSL) to prevent the unauthorized disclosure of information during transmission.
SLEM 5 must have SSH installed to protect the confidentiality and integrity of transmitted information.
SLEM 5 must use SSH to protect the confidentiality and integrity of transmitted information.
SLEM 5 wireless network adapters must be disabled unless approved and documented.
All TOSS networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.
TOSS must protect wireless access to the system using authentication of users and/or devices.
The web server must use HTTP/2, at a minimum.
The web server must disable HTTP/1.x downgrading.
The web server must only use forward proxies that route HTTP/2 requests upstream.
The vCenter Server must use DOD-approved encryption to protect the confidentiality of network sessions.