SRG-OS-000250-GPOS-00093 Controls

STIG IDVersionTitleProduct
ALMA-09-002990V1R1AlmaLinux OS 9 SSH client must be configured to use only encryption ciphers employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH client connections.
ALMA-09-003100V1R1AlmaLinux OS 9 must implement DOD-approved encryption ciphers to protect the confidentiality of SSH client connections.
ALMA-09-003210V1R1AlmaLinux OS 9 SSH client must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms.
ALMA-09-003320V1R1AlmaLinux OS 9 must implement DOD-approved encryption ciphers to protect the confidentiality of SSH server connections.
ALMA-09-003325V1R1AlmaLinux OS 9 SSH server must be configured to use only FIPS 140-3 validated key exchange algorithms.
ALMA-09-003430V1R1AlmaLinux OS 9 must implement DOD-approved systemwide cryptographic policies to protect the confidentiality of SSH server connections.
ALMA-09-003540V1R1AlmaLinux OS 9 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms.
ALMA-09-003760V1R1AlmaLinux OS 9 must implement DOD-approved TLS encryption in the GnuTLS package.
ALMA-09-003980V1R1AlmaLinux OS 9 must implement DOD-approved encryption in the OpenSSL package.
ALMA-09-004090V1R1AlmaLinux OS 9 must implement DOD-approved TLS encryption in the OpenSSL package.
UBTU-18-010417V2R15The Ubuntu operating system must configure the SSH daemon to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms to protect the integrity of nonlocal maintenance and diagnostic communications.
UBTU-18-010421V2R15The Ubuntu operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.
UBTU-20-010045V1R9The Ubuntu operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.
UBTU-24-100830V1R1Ubuntu 24.04 LTS must configure the SSH daemon to use Message Authentication Codes (MACs) employing FIPS 140-3 approved cryptographic hashes to prevent the unauthorized disclosure of information and/or detect changes to information during transmission.
UBTU-24-100850V1R1Ubuntu 24.04 LTS must configure the SSH client to use FIPS 140-3 approved ciphers to prevent the unauthorized disclosure of information and/or detect changes to information during transmission.
UBTU-24-100860V1R1Ubuntu 24.04 LTS SSH client must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms.
WN10-CC-000285V2R8The Remote Desktop Session Host must require secure RPC communications.
WN11-CC-000285V2R1The Remote Desktop Session Host must require secure RPC communications.
UBTU-22-255055V2R1Ubuntu 22.04 LTS must configure the SSH daemon to use Message Authentication Codes (MACs) employing FIPS 140-3-approved cryptographic hashes to prevent the unauthorized disclosure of information and/or detect changes to information during transmission.
RHEL-08-010290V1R9The RHEL 8 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-2 validated cryptographic hash algorithms.
RHEL-08-010291V1R9The RHEL 8 operating system must implement DoD-approved encryption to protect the confidentiality of SSH server connections.
RHEL-08-010293V1R9The RHEL 8 operating system must implement DoD-approved encryption in the OpenSSL package.
RHEL-08-010294V1R9The RHEL 8 operating system must implement DoD-approved TLS encryption in the OpenSSL package.
RHEL-08-010295V1R9The RHEL 8 operating system must implement DoD-approved TLS encryption in the GnuTLS package.
RHEL-08-010287V1R9The RHEL 8 SSH daemon must be configured to use system-wide crypto policies.
RHEL-08-040342V1R9RHEL 8 SSH server must be configured to use only FIPS-validated key exchange algorithms.
RHEL-07-040180V3R8The Red Hat Enterprise Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) authentication communications.
RHEL-07-040190V3R8The Red Hat Enterprise Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) communications.
RHEL-07-040200V3R8The Red Hat Enterprise Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) communications.
RHEL-07-040400V3R8The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon is configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.
RHEL-09-255055V2R1RHEL 9 SSH daemon must be configured to use system-wide crypto policies.
RHEL-09-255060V2R1RHEL 9 must implement DOD-approved encryption ciphers to protect the confidentiality of SSH client connections.
RHEL-09-255065V2R1RHEL 9 must implement DOD-approved encryption ciphers to protect the confidentiality of SSH server connections.
RHEL-09-255075V2R1RHEL 9 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms.
RHEL-09-672030V2R1RHEL 9 must implement DOD-approved TLS encryption in the GnuTLS package.
RHEL-09-672035V2R1RHEL 9 must implement DOD-approved encryption in the OpenSSL package.
RHEL-09-672040V2R1RHEL 9 must implement DOD-approved TLS encryption in the OpenSSL package.
OL09-00-000252V1R1The OL 9 SSH daemon must be configured to use systemwide cryptographic policies.
OL09-00-000254V1R1OL 9 SSH server must be configured to use only ciphers employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH server connections.
OL09-00-000255V1R1OL 9 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH server connections.
OL09-00-000261V1R1OL 9 SSH client must be configured to use only DOD-approved encryption ciphers employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH client connections.
OL09-00-000262V1R1OL 9 SSH client must be configured to use only DOD-approved Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH client connections.
WN16-CC-000400V2R10The Remote Desktop Session Host must require secure Remote Procedure Call (RPC) communications.
WN16-CC-000410V2R10Remote Desktop Services must be configured with the client connection encryption set to High Level.
SLES-15-040450V1R9The SUSE operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.
SLES-12-030270V2R13The SUSE operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.
OL07-00-040180V2R14The Oracle Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) authentication communications.
OL07-00-040190V2R14The Oracle Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) communications.
OL07-00-040200V2R14The Oracle Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) communications.
OL07-00-040400V2R14The Oracle Linux operating system must be configured so that the SSH daemon is configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.
OL08-00-010287V1R9The OL 8 SSH daemon must be configured to use system-wide crypto policies.
OL08-00-010293V1R9The OL 8 operating system must implement DoD-approved encryption in the OpenSSL package.
OL08-00-010294V1R9The OL 8 operating system must implement DoD-approved TLS encryption in the OpenSSL package.
OL08-00-010295V1R9The OL 8 operating system must implement DoD-approved TLS encryption in the GnuTLS package.
OL08-00-040342V1R9OL 8 SSH server must be configured to use only FIPS-validated key exchange algorithms.