Skip to content

The application must utilize FIPS-validated cryptographic modules when signing application components.

An XCCDF Rule

Description

<VulnDiscussion>Applications that distribute components of the application must sign the components to provide an identity assurance to consumers of the application component. Components can include application messages or application code. Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to validate the author of application components. The application must implement cryptographic modules adhering to the higher standards approved by the federal government since this provides assurance the modules have been tested and validated. If the application resides on a National Security System (NSS) it must not use algorithms weaker than SHA-384.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>

ID
SV-222570r879885_rule
Severity
Medium
References
Updated



Remediation - Manual Procedure

Utilize FIPS-validated algorithms when signing application components.