Skip to content

SLEM 5 must employ FIPS 140-2/140-3-approved cryptographic hashing algorithms for system authentication.

An XCCDF Rule