Information
While security governance is important for all organizations, it is a best practice to enforce security policies. Wherever possible, configure your system security parameters to comply with your security policies and guidelines to prevent misuse.
NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.
Solution
Configure all services with security best practices in mind. Enable security features for any required services, protocols, or daemons. Choose services such as SSH, which have built-in security mechanisms for user/peer authentication, encryption and data integrity authentication, over less secure equivalents such as Telnet.
Item Details
Category: PROGRAM MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION
References: 800-53|PM-1, 800-53|PM-2, 800-53|PM-3, 800-53|PM-4, 800-53|PM-5, 800-53|PM-6, 800-53|PM-7, 800-53|PM-8, 800-53|PM-9, 800-53|PM-10, 800-53|PM-11, 800-53|SC-7
Control ID: 0cb0665d75503977696cc63b3695f3359c41899153664694bad4eaccb6471962