Skip to content

The network device must use FIPS 140-2 approved algorithms for authentication to a cryptographic module.

An XCCDF Rule