Skip to content
ATO Pathways
Log In
Overview
Search
Catalogs
SCAP
OSCAL
Catalogs
Profiles
Documents
References
Knowledge Base
Platform Documentation
Compliance Dictionary
Platform Changelog
About
Catalogs
XCCDF
Application Security and Development Security Technical Implementation Guide
APSC-DV-002010
APSC-DV-002010
An XCCDF Group - A logical subset of the XCCDF Benchmark
Details
Profiles
Prose
APSC-DV-002010
1 Rule
<GroupDescription></GroupDescription>
The application must implement NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
Medium Severity
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect classified data. The application must implement cryptographic modules adhering to the higher standards approved by the federal government since this provides assurance they have been tested and validated. Advanced Encryption Standard (AES) Symmetric block cipher used for information protection FIPS Pub 197 Use 256 bit keys to protect up to TOP SECRET Elliptic Curve Diffie-Hellman (ECDH) Key Exchange Asymmetric algorithm used for key establishment NIST SP 800-56A Use Curve P-384 to protect up to TOP SECRET. Elliptic Curve Digital Signature Algorithm (ECDSA) Asymmetric algorithm used for digital signatures FIPS Pub 186-4 Use Curve P-384 to protect up to TOP SECRET. Secure Hash Algorithm (SHA) Algorithm used for computing a condensed representation of information FIPS Pub 180-4 Use SHA-384 to protect up to TOP SECRET. Diffie-Hellman (DH) Key Exchange Asymmetric algorithm used for key establishment IETF RFC 3526 Minimum 3072-bit modulus to protect up to TOP SECRET RSA Asymmetric algorithm used for key establishment NIST SP 800-56B rev 1 Minimum 3072-bit modulus to protect up to TOP SECRET RSA Asymmetric algorithm used for digital signatures FIPS PUB 186-4 Minimum 3072 bit-modulus to protect up to TOP SECRET.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>