Skip to content

If Sentry stores secret or private keys, it must use FIPS-approved key management technology and processes in the production and control of private/secret cryptographic keys.

An XCCDF Rule

Description

Private key data is used to prove that the entity presenting a public key certificate is the certificate's rightful owner. Compromise of private key data allows an adversary to impersonate the key holder.

ID
SV-251012r1028177_rule
Version
MOIS-AL-000170
Severity
Medium
References
Updated

Remediation Templates

A Manual Procedure

Configure the Sentry Server to use a FIPS 140-2-validated cryptographic module.

On the Sentry console, do the following:
1. SSH to Sentry Server from any SSH client.
2. Enter the administrator credentials set when Sentry was installed.
3. Enter "enable".