Skip to content

The application must use encryption to implement key exchange and authenticate endpoints prior to establishing a communication channel for key exchange.

An XCCDF Rule

Description

If the application does not use encryption and authenticate endpoints prior to establishing a communication channel and prior to transmitting encryption keys, these keys may be intercepted, and could be used to decrypt the traffic of the current session, leading to potential loss or compromise of DoD data.

ID
SV-222641r961863_rule
Version
APSC-DV-003100
Severity
Medium
References
Updated

Remediation Templates

A Manual Procedure

Use encryption for key exchange.