CCI-002421
Implement cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission.
The BlackBerry UEM server must connect to [assignment: [SQL Server]] with an authenticated and secure (encrypted) connection to protect the confidentiality and integrity of transmitted information.
1 rule found Severity: Medium

Citrix License Server must implement cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission unless otherwise protected by alternative physical safeguards, such as, at a minimum, a Protected Distribution Systems (PDS).
1 rule found Severity: High

XenDesktop License Server must implement cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission unless otherwise protected by alternative physical safeguards, such as, at a minimum, a Protected Distribution Systems (PDS).
1 rule found Severity: High

1 rule found Severity: High

1 rule found Severity: Medium

2 rules found Severity: High

TCP socket binding for all Docker Engine - Enterprise nodes in a Universal Control Plane (UCP) cluster must be disabled.
1 rule found Severity: Medium

DoD-approved encryption must be implemented to protect the confidentiality and integrity of remote access sessions, information during preparation for transmission, information during reception, and information during transmission in addition to enforcing replay-resistant authentication mechanisms for network access to privileged accounts.
1 rule found Severity: High

The Infoblox DNS server must implement cryptographic mechanisms to detect changes to information during transmission unless otherwise protected by alternative physical safeguards, such as, at a minimum, a Protected Distribution System (PDS).
1 rule found Severity: Medium

The MQ Appliance messaging server must employ approved cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission.
1 rule found Severity: Medium

The WebSphere Application Server must utilize FIPS 140-2-approved encryption modules when authenticating users and processes.
1 rule found Severity: Medium

1 rule found Severity: Medium

The Infoblox system must implement cryptographic mechanisms to detect changes to information during transmission unless otherwise protected by alternative physical safeguards, such as, at a minimum, a Protected Distribution System (PDS).
1 rule found Severity: Medium

The ISEC7 EMM Suite must protect the confidentiality and integrity of transmitted information during preparation for transmission and during reception using cryptographic mechanisms.
1 rule found Severity: Medium

The Windows 2012 DNS Server must maintain the integrity of information during preparation for transmission.
1 rule found Severity: Medium

Nutanix AOS must implement DoD-approved encryption to protect the confidentiality of remote access sessions.
1 rule found Severity: High

Oracle WebLogic must employ cryptographic encryption to protect the integrity and confidentiality of nonlocal maintenance and diagnostic communications.
1 rule found Severity: Medium

Oracle WebLogic must protect the confidentiality of applications and leverage transmission protection mechanisms, such as TLS and SSL VPN, when deploying applications.
1 rule found Severity: Medium

1 rule found Severity: Medium

The Tanium Server must protect the confidentiality and integrity of transmitted information, in preparation to be transmitted and data at rest, with cryptographic signing capabilities enabled to protect the authenticity of communications sessions when making requests from Tanium Clients.
1 rule found Severity: Medium

The Ubuntu operating system must use SSH to protect the confidentiality and integrity of transmitted information unless otherwise protected by alternative physical safeguards, such as, at a minimum, a Protected Distribution System (PDS).
1 rule found Severity: High

The Red Hat Enterprise Linux operating system must be configured so that all networked systems have SSH installed.
1 rule found Severity: Medium

The Red Hat Enterprise Linux operating system must be configured so that all networked systems use SSH for confidentiality and integrity of transmitted and received information as well as information during preparation for transmission.
1 rule found Severity: Medium

The BIND 9.x server implementation must uniquely identify and authenticate the other DNS server before responding to a server-to-server transaction, zone transfer and/or dynamic update request using cryptographically based bidirectional authentication to protect the integrity of the information in transit.
1 rule found Severity: High

The Ubuntu operating system must configure the SSH daemon to use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hashes to prevent the unauthorized disclosure of information and/or detect changes to information during transmission.
1 rule found Severity: Medium

The Ubuntu operating system must configure the SSH daemon to use FIPS 140-2 approved ciphers to prevent the unauthorized disclosure of information and/or detect changes to information during transmission.
1 rule found Severity: Medium

The DNS server implementation must implement cryptographic mechanisms to detect changes to information during transmission unless otherwise protected by alternative physical safeguards, such as, at a minimum, a Protected Distribution System (PDS).
1 rule found Severity: Medium

SSMC must employ strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions.
1 rule found Severity: Medium

The HPE 3PAR OS must be configured to restrict the encryption algorithms and protocols to comply with DOD-approved encryption to protect the confidentiality and integrity of remote access sessions.
1 rule found Severity: High

AIX must protect the confidentiality and integrity of transmitted information during preparation for transmission and maintain the confidentiality and integrity of information during reception and disable all non-encryption network access methods.
1 rule found Severity: Medium

The ISEC7 SPHERE must protect the confidentiality and integrity of transmitted information during preparation for transmission and during reception using cryptographic mechanisms.
1 rule found Severity: Medium

The Jamf Pro EMM server must connect to [Authentication Gateway Service (AGS)] with an authenticated and secure (encrypted) connection to protect the confidentiality and integrity of transmitted information.
1 rule found Severity: High

1 rule found Severity: Medium

1 rule found Severity: Medium

Windows 11 systems must have Unified Extensible Firmware Interface (UEFI) firmware and be configured to run in UEFI mode, not Legacy BIOS.
1 rule found Severity: Medium

The setting Domain member: Digitally encrypt or sign secure channel data (always) must be configured to Enabled.
1 rule found Severity: Medium

The setting Domain member: Digitally encrypt secure channel data (when possible) must be configured to enabled.
1 rule found Severity: Medium

The setting Domain member: Digitally sign secure channel data (when possible) must be configured to Enabled.
1 rule found Severity: Medium

1 rule found Severity: Medium

The setting Microsoft network client: Digitally sign communications (always) must be configured to Enabled.
1 rule found Severity: Medium

The setting Microsoft network client: Digitally sign communications (if server agrees) must be configured to Enabled.
1 rule found Severity: Medium

The setting Microsoft network server: Digitally sign communications (always) must be configured to Enabled.
1 rule found Severity: Medium

The setting Microsoft network server: Digitally sign communications (if client agrees) must be configured to Enabled.
1 rule found Severity: Medium

The Windows DNS Server must implement cryptographic mechanisms to detect changes to information during transmission.
1 rule found Severity: Medium

The Oracle Linux operating system must be configured so that all wireless network adapters are disabled.
1 rule found Severity: Medium

Automation Controller must implement cryptography mechanisms to protect the integrity of information.
1 rule found Severity: High

1 rule found Severity: High

All TOSS networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.
1 rule found Severity: Medium

1 rule found Severity: High

The application server must employ approved cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission.
1 rule found Severity: Medium

The application must implement cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission unless otherwise protected by alternative physical safeguards, such as, at a minimum, a Protected Distribution System (PDS).
1 rule found Severity: Medium

Ubuntu 22.04 LTS must configure the SSH daemon to use FIPSĀ 140-3-approved ciphers to prevent the unauthorized disclosure of information and/or detect changes to information during transmission.
1 rule found Severity: Medium

Ubuntu 22.04 LTS must configure the SSH daemon to use Message Authentication Codes (MACs) employing FIPS 140-3-approved cryptographic hashes to prevent the unauthorized disclosure of information and/or detect changes to information during transmission.
1 rule found Severity: Medium

All AlmaLinux OS 9 networked systems must implement SSH to protect the confidentiality and integrity of transmitted and received information, including information being prepared for transmission.
1 rule found Severity: Medium

1 rule found Severity: Medium

The operating system must implement cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission unless otherwise protected by alternative physical safeguards, such as, at a minimum, a Protected Distribution System (PDS).
1 rule found Severity: High

IBM z/OS SSL encryption options for the TN3270 Telnet Server must be specified properly for each statement that defines a SECUREPORT or within the TELNETGLOBALS.
2 rules found Severity: Medium

IBM z/OS SSL encryption options for the TN3270 Telnet server must be specified properly for each statement that defines a SECUREPORT or within the TELNETGLOBALS.
1 rule found Severity: Medium

SharePoint must employ cryptographic mechanisms preventing the unauthorized disclosure of information during transmission, unless the transmitted data is otherwise protected by alternative physical measures.
1 rule found Severity: High

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

Windows Server 2019 setting Domain member: Digitally encrypt or sign secure channel data (always) must be configured to Enabled.
1 rule found Severity: Medium

Windows Server 2019 setting Domain member: Digitally encrypt secure channel data (when possible) must be configured to enabled.
1 rule found Severity: Medium

Windows Server 2019 setting Domain member: Digitally sign secure channel data (when possible) must be configured to Enabled.
1 rule found Severity: Medium

1 rule found Severity: Medium

Windows Server 2019 setting Microsoft network client: Digitally sign communications (always) must be configured to Enabled.
1 rule found Severity: Medium

Windows Server 2019 setting Microsoft network client: Digitally sign communications (if server agrees) must be configured to Enabled.
1 rule found Severity: Medium

Windows Server 2019 setting Microsoft network server: Digitally sign communications (always) must be configured to Enabled.
1 rule found Severity: Medium

Windows Server 2019 setting Microsoft network server: Digitally sign communications (if client agrees) must be configured to Enabled.
1 rule found Severity: Medium

1 rule found Severity: Medium

Windows Server 2022 setting Domain member: Digitally encrypt or sign secure channel data (always) must be configured to Enabled.
1 rule found Severity: Medium

Windows Server 2022 setting Domain member: Digitally encrypt secure channel data (when possible) must be configured to Enabled.
1 rule found Severity: Medium

Windows Server 2022 setting Domain member: Digitally sign secure channel data (when possible) must be configured to Enabled.
1 rule found Severity: Medium

1 rule found Severity: Medium

The DBMS must employ cryptographic mechanisms preventing the unauthorized disclosure of information during transmission unless the transmitted data is otherwise protected by alternative physical measures.
1 rule found Severity: High

Windows Server 2022 setting Microsoft network client: Digitally sign communications (always) must be configured to Enabled.
1 rule found Severity: Medium

Windows Server 2022 setting Microsoft network client: Digitally sign communications (if server agrees) must be configured to Enabled.
1 rule found Severity: Medium

Windows Server 2022 setting Microsoft network server: Digitally sign communications (always) must be configured to Enabled.
1 rule found Severity: Medium

Windows Server 2022 setting Microsoft network server: Digitally sign communications (if client agrees) must be configured to Enabled.
1 rule found Severity: Medium

All OL 8 networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.
1 rule found Severity: Medium

All RHEL 9 networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.
1 rule found Severity: Medium

1 rule found Severity: Medium

All networked SUSE operating systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.
2 rules found Severity: High

The operating system must employ cryptographic mechanisms to recognize changes to information during transmission unless otherwise protected by alternative physical measures.
2 rules found Severity: Medium

The operating system must employ cryptographic mechanisms to prevent unauthorized disclosure of information during transmission unless otherwise protected by alternative physical measures.
2 rules found Severity: Medium

1 rule found Severity: Low

The vCenter Server must use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data during electronic dissemination using remote access.
1 rule found Severity: High

The vCenter Server must use DOD-approved encryption to protect the confidentiality of network sessions.
1 rule found Severity: Medium

3 rules found Severity: High
