SRG-OS-000250-GPOS-00093 Controls

STIG IDVersionTitleProduct
RHEL-08-010290V1R6The RHEL 8 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-2 validated cryptographic hash algorithms.
RHEL-08-010291V1R6The RHEL 8 operating system must implement DoD-approved encryption to protect the confidentiality of SSH server connections.
RHEL-08-010293V1R6The RHEL 8 operating system must implement DoD-approved encryption in the OpenSSL package.
RHEL-08-010294V1R6The RHEL 8 operating system must implement DoD-approved TLS encryption in the OpenSSL package.
RHEL-08-010295V1R6The RHEL 8 operating system must implement DoD-approved TLS encryption in the GnuTLS package.
RHEL-08-010287V1R6The RHEL 8 SSH daemon must be configured to use system-wide crypto policies.
SLES-15-040450V1R10The SUSE operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.
UBTU-18-010417V2R12The Ubuntu operating system must configure the SSH daemon to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms to protect the integrity of nonlocal maintenance and diagnostic communications.
UBTU-18-010421V2R12The Ubuntu operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.
UBTU-20-010045V1R10The Ubuntu operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.
OL07-00-040180V3R1The Oracle Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) authentication communications.
OL07-00-040190V3R1The Oracle Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) communications.
OL07-00-040200V3R1The Oracle Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) communications.
OL07-00-040400V3R1The Oracle Linux operating system must be configured so that the SSH daemon is configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.
RHEL-07-040180V3R6The Red Hat Enterprise Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) authentication communications.
RHEL-07-040190V3R6The Red Hat Enterprise Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) communications.
RHEL-07-040200V3R6The Red Hat Enterprise Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) communications.
RHEL-07-040400V3R6The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon is configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.
SLES-12-030270V3R1The SUSE operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.
ALMA-09-002990V1R1AlmaLinux OS 9 SSH client must be configured to use only encryption ciphers employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH client connections.
ALMA-09-003100V1R1AlmaLinux OS 9 must implement DOD-approved encryption ciphers to protect the confidentiality of SSH client connections.
ALMA-09-003210V1R1AlmaLinux OS 9 SSH client must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms.
ALMA-09-003320V1R1AlmaLinux OS 9 must implement DOD-approved encryption ciphers to protect the confidentiality of SSH server connections.
ALMA-09-003325V1R1AlmaLinux OS 9 SSH server must be configured to use only FIPS 140-3 validated key exchange algorithms.
ALMA-09-003430V1R1AlmaLinux OS 9 must implement DOD-approved systemwide cryptographic policies to protect the confidentiality of SSH server connections.
ALMA-09-003540V1R1AlmaLinux OS 9 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms.
ALMA-09-003760V1R1AlmaLinux OS 9 must implement DOD-approved TLS encryption in the GnuTLS package.
ALMA-09-003980V1R1AlmaLinux OS 9 must implement DOD-approved encryption in the OpenSSL package.
ALMA-09-004090V1R1AlmaLinux OS 9 must implement DOD-approved TLS encryption in the OpenSSL package.
OL08-00-010287V1R6The OL 8 SSH daemon must be configured to use system-wide crypto policies.
OL08-00-010293V1R6The OL 8 operating system must implement DoD-approved encryption in the OpenSSL package.
OL08-00-010294V1R6The OL 8 operating system must implement DoD-approved TLS encryption in the OpenSSL package.
OL08-00-010295V1R6The OL 8 operating system must implement DoD-approved TLS encryption in the GnuTLS package.
OL08-00-040342V1R6OL 8 SSH server must be configured to use only FIPS-validated key exchange algorithms.
OL09-00-000252V1R1The OL 9 SSH daemon must be configured to use systemwide cryptographic policies.
OL09-00-000254V1R1OL 9 SSH server must be configured to use only ciphers employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH server connections.
OL09-00-000255V1R1OL 9 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH server connections.
OL09-00-000261V1R1OL 9 SSH client must be configured to use only DOD-approved encryption ciphers employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH client connections.
OL09-00-000262V1R1OL 9 SSH client must be configured to use only DOD-approved Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH client connections.
UBTU-24-100830V1R1Ubuntu 24.04 LTS must configure the SSH daemon to use Message Authentication Codes (MACs) employing FIPS 140-3 approved cryptographic hashes to prevent the unauthorized disclosure of information and/or detect changes to information during transmission.
UBTU-24-100850V1R1Ubuntu 24.04 LTS must configure the SSH client to use FIPS 140-3 approved ciphers to prevent the unauthorized disclosure of information and/or detect changes to information during transmission.
UBTU-24-100860V1R1Ubuntu 24.04 LTS SSH client must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms.
UBTU-22-255055V1R1Ubuntu 22.04 LTS must configure the SSH daemon to use Message Authentication Codes (MACs) employing FIPS 140-3-approved cryptographic hashes to prevent the unauthorized disclosure of information and/or detect changes to information during transmission.
WN11-CC-000285V1R6The Remote Desktop Session Host must require secure RPC communications.
RHEL-09-255065V2R5The RHEL 9 SSH server must be configured to use only DOD-approved encryption ciphers employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH server connections.
RHEL-09-255075V2R5The RHEL 9 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH server connections.
RHEL-09-255064V2R5The RHEL 9 SSH client must be configured to use only DOD-approved encryption ciphers employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH client connections.
RHEL-09-255070V2R5The RHEL 9 SSH client must be configured to use only DOD-approved Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH client connections.
WN10-CC-000285V3R1The Remote Desktop Session Host must require secure RPC communications.
WN16-CC-000400V2R9The Remote Desktop Session Host must require secure Remote Procedure Call (RPC) communications.
WN16-CC-000410V2R9Remote Desktop Services must be configured with the client connection encryption set to High Level.