3.077 - The system will be configured to use FIPS-compliant algorithms for encryption, hashing, and signing.

Information

This setting ensures that the system uses algorithms that are FIPS-compliant for encryption, hashing, and signing. FIPS-compliant algorithms meet specific standards established by the U.S. Government and should be the algorithms used for all OS encryption functions.

Solution

Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> 'System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing' to 'Enabled'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_2008_R2_DC_V1R34_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-13, CAT|II, CCI|CCI-002450, Rule-ID|SV-32342r1_rule, STIG-ID|3.077, Vuln-ID|V-3383

Plugin: Windows

Control ID: f4a5e0b2015bf9fd8f2e6f1d9a3d5761897ca0fc3cbe0202a288566c73da89f0