Skip to content

The system must be configured to use FIPS-compliant algorithms for encryption, hashing, and signing.

An XCCDF Rule