Skip to content

The application must utilize FIPS-validated cryptographic modules when generating cryptographic hashes.

An XCCDF Rule