The Installed Operating System Is FIPS 140-2 Certified
Install the dracut-fips-aesni Package
Install the dracut-fips Package
Ensure '/etc/system-fips' exists
Enable FIPS Mode in GRUB2
Enable Dracut FIPS Module
Set kernel parameter 'crypto.fips_enabled' to 1
Verify '/proc/sys/crypto/fips_enabled' exists
Adobe Acrobat Pro DC Continuous FIPS mode must be enabled.
Adobe Reader DC must enable FIPS mode.
Kona Site Defender providing encryption intermediary services must implement NIST FIPS-validated cryptography to generate cryptographic hashes.
Kona Site Defender providing encryption intermediary services must implement NIST FIPS-validated cryptography for digital signatures.
Kona Site Defender providing encryption intermediary services must use NIST FIPS-validated cryptography to implement encryption services.
The ALG providing encryption intermediary services must implement NIST FIPS-validated cryptography to generate cryptographic hashes.
The ALG providing encryption intermediary services must implement NIST FIPS-validated cryptography for digital signatures.
The ALG providing encryption intermediary services must use NIST FIPS-validated cryptography to implement encryption services.
Application servers must use NIST-approved or NSA-approved key management technology and processes.
The application server must use DoD- or CNSS-approved PKI Class 3 or Class 4 certificates.
The application server must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
The application must utilize FIPS-validated cryptographic modules when signing application components.
The application must utilize FIPS-validated cryptographic modules when generating cryptographic hashes.
The application must utilize FIPS-validated cryptographic modules when protecting unclassified information that requires cryptographic protection.
Applications making SAML assertions must use FIPS-approved random numbers in the generation of SessionIndex in the SAML element AuthnStatement.
The application must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
A BIND 9.x server must implement NIST FIPS-validated cryptography for provisioning digital signatures and generating cryptographic hashes.
The CA API Gateway providing encryption intermediary services must implement NIST FIPS-validated cryptography to generate cryptographic hashes.
The CA API Gateway providing encryption intermediary services must implement NIST FIPS-validated cryptography for digital signatures.
The CA API Gateway providing encryption intermediary services must use NIST FIPS-validated cryptography to implement encryption services.
CA IDMS must implement NIST FIPS 140-2 validated cryptographic modules to protect data-in-transit.
The Central Log Server must implement NIST FIPS-validated cryptography for the following: to provision digital signatures; to generate cryptographic hashes; and/or to protect unclassified information requiring confidentiality and cryptographic protection.
Delivery Controller must implement NIST FIPS-validated cryptography for the following: to provision digital signatures; to generate cryptographic hashes; and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
Citrix Receiver must implement DoD-approved encryption.
FIPS mode must be enabled on all Docker Engine - Enterprise nodes.
Docker Enterprise data exchanged between Linux containers on different nodes must be encrypted on the overlay network.
The DNS server must implement NIST FIPS-validated cryptography for provisioning digital signatures, generating cryptographic hashes, and protecting unclassified information requiring confidentiality.
The Infoblox DNS server must implement NIST FIPS-validated cryptography for provisioning digital signatures, generating cryptographic hashes, and protecting unclassified information requiring confidentiality.
The IBM Aspera Console must be configured to use NIST FIPS-validated cryptography to protect the integrity of file transfers.
IBM Aspera Faspex must be configured to use NIST FIPS-validated cryptography to protect the integrity of file transfers.
IBM Aspera Shares feature must be configured to use NIST FIPS-validated cryptography to protect the integrity of file transfers.
The IBM Aspera High-Speed Transfer Endpoint must be configured to use NIST FIPS-validated cryptography to protect the integrity of remote access sessions.
The IBM Aspera High-Speed Transfer Endpoint must have a master-key set to encrypt the dynamic token encryption key.
The IBM Aspera High-Speed Transfer Server must be configured to use NIST FIPS-validated cryptography to protect the integrity of remote access sessions.
The IBM Aspera High-Speed Transfer Server must have a master-key set to encrypt the dynamic token encryption key.
The DataPower Gateway providing encryption intermediary services must implement NIST FIPS-validated cryptography to generate cryptographic hashes.
The DataPower Gateway providing encryption intermediary services must implement NIST FIPS-validated cryptography for digital signatures.
The DataPower Gateway providing encryption intermediary services must use NIST FIPS-validated cryptography to implement encryption services.
The MQ Appliance messaging server must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
The MQ Appliance messaging server must use DoD- or CNSS-approved PKI Class 3 or Class 4 certificates.
MQ Appliance messaging servers must use NIST-approved or NSA-approved key management technology and processes.
The WebSphere Liberty Server must use DoD-issued/signed certificates.
The WebSphere Liberty Server must use FIPS 140-2 approved encryption modules when authenticating users and processes.
DB2 must use NSA-approved cryptography to protect classified information in accordance with the data owners requirements.
The WebSphere Application Server must utilize FIPS 140-2-approved encryption modules when authenticating users and processes.
The WebSphere Application Server must use DoD-approved Signer Certificates.
The IBM z/VM TCP/IP SECUREDATA option for FTP must be set to REQUIRED.
All IBM z/VM TCP/IP servers must be configured for SSL/TLS connection.
The DNS server must implement NIST FIPS-validated cryptography for provisioning digital signatures, generating cryptographic hashes, and protecting unclassified information requiring confidentiality.
The Ivanti MobileIron Core server must use a FIPS-validated cryptographic module to generate cryptographic hashes.
The Ivanti MobileIron Core server must be configured to implement FIPS 140-2 mode for all server and agent encryption.
The ISEC7 EMM Suite must use a FIPS 140-2-validated cryptographic module to implement encryption services for unclassified information requiring confidentiality, generate cryptographic hashes, and to configure web management tools with FIPS-validated Advanced Encryption Standard (AES) cipher block algorithm to protect the confidentiality of maintenance and diagnostic communications for nonlocal maintenance sessions.
The ISEC7 EMM Suite must use a FIPS-validated cryptographic module to provision digital signatures.
The Sentry providing encryption intermediary services must implement NIST FIPS-validated cryptography to generate cryptographic hashes.
The Sentry providing encryption intermediary services must implement NIST FIPS-validated cryptography for digital signatures.
The Sentry providing encryption intermediary services must use NIST FIPS-validated cryptography to implement encryption services.
When the Jamf Pro EMM server cannot establish a connection to determine the validity of a certificate, the server must not have the option to accept the certificate.
The JBoss server must be configured to use DoD- or CNSS-approved PKI Class 3 or Class 4 certificates.
The Juniper SRX Services Gateway VPN Internet Key Exchange (IKE) must use cryptography that is compliant with Suite B parameters when transporting classified traffic across an unclassified network.
The Juniper SRX Services Gateway VPN IKE must use NIST FIPS-validated cryptography to implement encryption services for unclassified VPN traffic.
The Mainframe Product must implement NIST FIPS-validated cryptography to provision digital signatures in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards.
The Mainframe Product must implement NIST FIPS-validated cryptography to generate and validate cryptographic hashes in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards.
The Mainframe Product must implement NIST FIPS-validated cryptography to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards.
The Mainframe Product must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive orders, directives, policies, regulations, and standards.
Azure SQL Database must use NSA-approved cryptography to protect classified information in accordance with the data owners requirements.
The ability to add signatures to email messages must be allowed.
Digital signatures must be allowed.
Outlook minimum encryption key length settings must be set.
SharePoint must employ NSA-approved cryptography to protect classified information.
SharePoint must employ FIPS-validated cryptography to protect unclassified information when such information must be separated from individuals who have the necessary clearances yet lack the necessary access approvals.
SQL Server must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations.
The salt value for zones signed using NSEC3 RRs must be changed every time the zone is completely re-signed.
The Windows 2012 DNS Server must implement NIST FIPS-validated cryptography for provisioning digital signatures, generating cryptographic hashes, and protecting unclassified information requiring confidentiality.
Nutanix AOS must use DoD- or CNSS-approved PKI Class 3 or Class 4 certificates.
Nutanix AOS must enable FIPS mode to implement NIST FIPS-validated cryptography.
OHS must have the SSLFIPS directive enabled to implement required cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance when encrypting data that must be compartmentalized.
Innoslate must use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data during electronic dissemination using remote access.
Splunk Enterprise must be installed with FIPS mode enabled, to implement NIST FIPS 140-2 approved ciphers for all cryptographic functions.
Symantec ProxySG providing forward proxy encryption intermediary services must use NIST FIPS-validated cryptography to implement encryption services.
Symantec ProxySG providing reverse proxy encryption intermediary services must implement NIST FIPS-validated cryptography to generate cryptographic hashes.
Symantec ProxySG providing reverse proxy encryption intermediary services must implement NIST FIPS-validated cryptography for digital signatures.
Symantec ProxySG providing reverse proxy encryption intermediary services must use NIST FIPS-validated cryptography to implement encryption services.
The SSLHonorCipherOrder must be configured to disable weak encryption algorithms on the Tanium Server.
The SSLCipherSuite must be configured to disable weak encryption algorithms on the Tanium Server.
The Tanium Operating System (TanOS) must use a FIPS-validated cryptographic module to provision digital signatures.
All UEM Agent cryptography supporting DoD functionality must be FIPS 140-2 validated.
The UEM server must use a FIPS-validated cryptographic module to generate cryptographic hashes.
The UEM server must be configured to implement FIPS 140-2 mode for all server and agent encryption.
The VPN Gateway must use an approved Commercial Solution for Classified (CSfC) when transporting classified traffic across an unclassified network.
The VPN Gateway must use a FIPS-validated cryptographic module to generate cryptographic hashes.
The VPN Gateway must use a FIPS-validated cryptographic module to implement encryption services for unclassified information requiring confidentiality.
The IPsec VPN Gateway IKE must use NIST FIPS-validated cryptography to implement encryption services for unclassified VPN traffic.
The VPN remote access server must be configured use cryptographic algorithms approved by NSA to protect NSS for remote access to a classified network.
The VPN gateway must use cryptographic algorithms approved by NSA to protect NSS when transporting classified traffic across an unclassified network.
The Apache web server must use encryption strength in accordance with the categorization of data hosted by the Apache web server when remote connections are provided.
Application servers must use NIST-approved or NSA-approved key management technology and processes.
The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider.
The macOS system must limit SSHD to FIPS-compliant connections.
The macOS system must limit SSH to FIPS-compliant connections.
The Ubuntu operating system must implement NIST FIPS-validated cryptography to protect classified information and for the following: to provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
The Ubuntu operating system must implement NIST FIPS-validated cryptography to protect classified information and for the following: To provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
PostgreSQL must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to generate and validate cryptographic hashes.
PostgreSQL must use NSA-approved cryptography to protect classified information in accordance with the data owner’s requirements.
PostgreSQL must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owner’s requirements.
The Cisco ASA must be configured to use NIST FIPS-validated cryptography for Internet Key Exchange (IKE) Phase 1.
The Cisco ASA must be configured to use a FIPS-validated cryptographic module to generate cryptographic hashes.
The Cisco ASA must be configured to use a FIPS-validated cryptographic module to implement IPsec encryption services.
The Cisco ASA VPN gateway must use cryptographic algorithms approved by NSA to protect NSS when transporting classified traffic across an unclassified network.
The Cisco ASA VPN remote access server must be configured to use an approved High Assurance Commercial Solution for Classified (CSfC) cryptographic algorithm for remote access to a classified network.
The container platform must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
The container platform must use a valid FIPS 140-2 approved cryptographic modules to generate hashes.
The container platform must use a FIPS-validated cryptographic module to implement encryption services for unclassified information requiring confidentiality.
The DBMS must use NSA-approved cryptography to protect classified information in accordance with the requirements of the data owner.
The DBMS must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to provision digital signatures.
The DBMS must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to generate and validate cryptographic hashes.
The DBMS must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owners requirements.
The DBMS must use NSA-approved cryptography to protect classified information in accordance with the data owner's requirements.
The EDB Postgres Advanced Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to provision digital signatures.
The EDB Postgres Advanced Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to generate and validate cryptographic hashes.
The EDB Postgres Advanced Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the requirements of the data owner.
The operating system must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
The operating system must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
SSMC must employ strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions.
The HPE 3PAR OS must be configured to implement NIST FIPS-validated cryptography for the following: To provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
AIX must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
The IBM z/OS systems requiring data at rest protection must properly employ IBM DS8880 or equivalent hardware solutions for full disk encryption.
IBM z/OS SSL encryption options for the TN3270 Telnet Server must be specified properly for each statement that defines a SECUREPORT or within the TELNETGLOBALS.
IBM z/OS SSL encryption options for the TN3270 Telnet server must be specified properly for each statement that defines a SECUREPORT or within the TELNETGLOBALS.
The ICS must be configured to use an approved Commercial Solution for Classified (CSfC) when transporting classified traffic across an unclassified network.
MarkLogic Server must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations and protect classified information in accordance with the requirements of the data owner.
MariaDB must use NSA-approved cryptography to protect classified information in accordance with the data owner's requirements.
MarkLogic Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to provision digital signatures.
MarkLogic Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to generate and validate cryptographic hashes.
MarkLogic Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the requirements of the data owner.
MongoDB must use NIST FIPS 140-2-validated cryptographic modules for cryptographic operations.
The .NET CLR must be configured to use FIPS approved encryption modules.
MariaDB must implement NIST FIPS 140-2 validated cryptographic modules to provision digital signatures.
MariaDB must implement NIST FIPS 140-2 validated cryptographic modules to generate and validate cryptographic hashes.
MariaDB must implement NIST FIPS 140-2 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owners requirements.
MongoDB must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations.
Turn off Encryption Support must be enabled.
Allow Fallback to SSL 3.0 (Internet Explorer) must be disabled.
SQL Server must use NSA-approved cryptography to protect classified information in accordance with the data owners requirements.
The minimum encryption key length in Outlook must be at least 168.
SQL Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to provision digital signatures.
SQL Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to generate and validate cryptographic hashes.
SQL Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owners requirements.
The system must be configured to use FIPS-compliant algorithms for encryption, hashing, and signing.
Separate, NSA-approved (Type 1) cryptography must be used to protect the directory data in transit for directory service implementations at a classified confidentiality level when replication data traverses a network cleared to a lower level than the data.
Windows Server 2016 must be configured to use FIPS-compliant algorithms for encryption, hashing, and signing.
Windows Server 2019 must use separate, NSA-approved (Type 1) cryptography to protect the directory data in transit for directory service implementations at a classified confidentiality level when replication data traverses a network cleared to a lower level than the data.
Windows Server 2019 must be configured to use FIPS-compliant algorithms for encryption, hashing, and signing.
Windows Server 2022 must use separate, NSA-approved (Type 1) cryptography to protect the directory data in transit for directory service implementations at a classified confidentiality level when replication data traverses a network cleared to a lower level than the data.
Windows Server 2022 must be configured to use FIPS-compliant algorithms for encryption, hashing, and signing.
The Oracle Linux operating system must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect data requiring data-at-rest protections in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
PostgreSQL must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owners requirements.
The MySQL Database Server 8.0 must use NSA-approved cryptography to protect classified information in accordance with the data owner's requirements.
The MySQL Database Server 8.0 must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to provision digital signatures.
The MySQL Database Server 8.0 must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to generate and validate cryptographic hashes.
The MySQL Database Server 8.0 must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owner's requirements.
The Palo Alto Networks security platform providing encryption intermediary services must implement NIST FIPS-validated cryptography to generate cryptographic hashes.
The Palo Alto Networks security platform, if used for TLS/SSL decryption, must use NIST FIPS-validated cryptography to implement encryption.
Automation Controller must implement cryptography mechanisms to protect the integrity of information.
Automation Controller must only allow the use of DOD PKI-established certificate authorities for verification of the establishment of protected sessions.
PostgreSQL must use NSA-approved cryptography to protect classified information in accordance with the data owners requirements.
Redis Enterprise DBMS must use NSA-approved cryptography to protect classified information in accordance with the data owners requirements.
Redis Enterprise DBMS must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to provision digital signatures.
Redis Enterprise DBMS must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to generate and validate cryptographic hashes.
Redis Enterprise DBMS must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owners requirements.
OpenShift must protect authenticity of communications sessions with the use of FIPS-validated 140-2 or 140-3 validated cryptography.
The Red Hat Enterprise Linux operating system must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect data requiring data-at-rest protections in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
FIPS 140-2 mode must be enabled on the SUSE operating system.
FIPS 140-2 mode must be enabled on the SUSE operating system.
RHEL 9 must enable FIPS mode.
RHEL 9 must have the crypto-policies package installed.
RHEL 9 crypto policy files must match files shipped with the operating system.
RHEL 9 crypto policy must not be overridden.
RHEL 9 must implement a system-wide encryption policy.
The operating system must employ FIPS-validate or NSA-approved cryptography to implement digital signatures.
Splunk Enterprise must be installed in FIPS mode to implement NIST FIPS-approved cryptography for all cryptographic functions.
The VMM must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
The VMM must implement NIST FIPS-validated cryptography for the following: to provision digital signatures; to generate cryptographic hashes; and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
The ESXi host SSH daemon must be configured to only use FIPS 140-2 validated ciphers.
VAMI must be configured with FIPS 140-2 compliant ciphers for HTTPS connections.
The ESXi host Secure Shell (SSH) daemon must be configured to only use FIPS 140-2 validated ciphers.
The Photon operating system must configure sshd to use approved encryption algorithms.
The Photon operating system must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, generate cryptographic hashes, and protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
The vCenter Server must enable FIPS-validated cryptography.
VMware Postgres must use FIPS 140-2 approved Transport Layer Security (TLS) ciphers.
Envoy must be configured to operate in FIPS mode.
The Photon operating system must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
The vCenter VAMI service must enable FIPS mode.
The web server must implement required cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance when encrypting data that must be compartmentalized.
The EDB Postgres Advanced Server must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for all cryptographic operations including generation of cryptographic hashes and data protection.
The Windows DNS Server must implement NIST FIPS-validated cryptography for provisioning digital signatures, generating cryptographic hashes, and protecting unclassified information requiring confidentiality.
The BIG-IP Core implementation must be configured to implement NIST FIPS-validated cryptography to generate cryptographic hashes when providing encryption traffic to virtual servers.
The BIG-IP Core implementation must be configured to implement NIST FIPS-validated cryptography for digital signatures when providing encrypted traffic to virtual servers.
The BIG-IP Core implementation must be configured to use NIST FIPS-validated cryptography to implement encryption services when providing encrypted traffic to virtual servers.
Ubuntu 22.04 LTS must implement NIST FIPS-validated cryptography to protect classified information and for the following: To provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
PostgreSQL must use NSA-approved cryptography to protect classified information in accordance with the data owner's requirements.
PostgreSQL must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to generate and validate cryptographic hashes.
PostgreSQL must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owners' requirements.
The Enterprise Voice, Video, and Messaging Endpoint must be configured to use cryptographic algorithms approved by NSA to protect NSS when transporting classified traffic across an unclassified network.
The F5 BIG-IP appliance must be configured to use cryptographic algorithms approved by NSA to protect NSS for remote access to a classified network.
The Enterprise Voice, Video, and Messaging Session Manager must implement NIST FIPS-validated cryptography for communications sessions.
The F5 BIG-IP appliance IPsec VPN must use cryptographic algorithms approved by NSA to protect NSS when transporting classified traffic across an unclassified network.
The IBM z/OS systems requiring data at rest protection must properly employ IBM DS8880 or equivalent hardware solutions for full disk encryption.
The ISEC7 SPHERE must use a FIPS-validated cryptographic module to provision digital signatures.
The ISEC7 SPHERE must use a FIPS 140-2-validated cryptographic module to implement encryption services for unclassified information requiring confidentiality, generate cryptographic hashes, and to configure web management tools with FIPS-validated Advanced Encryption Standard (AES) cipher block algorithm to protect the confidentiality of maintenance and diagnostic communications for nonlocal maintenance sessions.
The Ivanti EPMM server must use a FIPS-validated cryptographic module to generate cryptographic hashes.
The Ivanti EPMM server must be configured to implement FIPS 140-2 mode for all server and agent encryption.
FIPS mode must be enabled.
Swarm Secrets or Kubernetes Secrets must be used.
MongoDB must use NSA-approved cryptography to protect classified information in accordance with the data owner's requirements.
Rancher RKE2 must protect authenticity of communications sessions with the use of FIPS-validated 140-2 or 140-3 security requirements for cryptographic modules.
RHEL 9 must implement a systemwide encryption policy.
FIPS 140-2/140-3 mode must be enabled on SLEM 5.
TOSS must implement NIST FIPS-validated cryptography for the following: to provision digital signatures; to generate cryptographic hashes; and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
The vCenter Server must use DOD-approved encryption to protect the confidentiality of network sessions.